First published: Thu Mar 14 2024(Updated: )
This is a reflected cross site scripting vulnerability in the PaperCut NG/MF application server. An attacker can exploit this weakness by crafting a malicious URL that contains a script. When an unsuspecting user clicks on this malicious link, it could potentially lead to limited loss of confidentiality, integrity or availability.
Credit: eb41dac7-0af8-4f84-9f6d-0272772514f4
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut MF | ||
All of | ||
Any of | ||
PaperCut MF | <20.1.10 | |
PaperCut MF | >=21.0.0<21.2.14 | |
PaperCut MF | >=22.0.0<22.1.5 | |
PaperCut MF | >=23.0.1<23.0.7 | |
PaperCut NG | <20.1.10 | |
PaperCut NG | >=21.0.0<21.2.14 | |
PaperCut NG | >=22.0.0<22.1.5 | |
PaperCut NG | >=23.0.1<23.0.7 | |
Any of | ||
Apple macOS | ||
Linux Kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1883 has a CVSS score that indicates it is a medium severity reflected cross site scripting vulnerability.
To mitigate CVE-2024-1883, upgrade to the latest version of PaperCut NG/MF that addresses the vulnerability.
CVE-2024-1883 affects various versions of PaperCut NG and PaperCut MF, specifically versions before their respective updates.
CVE-2024-1883 enables attackers to conduct reflected cross site scripting attacks by crafting malicious URLs.
Users of affected versions of PaperCut NG and MF who click on crafted malicious links are at risk from CVE-2024-1883.