First published: Thu Mar 14 2024(Updated: )
This is a Server-Side Request Forgery (SSRF) vulnerability in the PaperCut NG/MF server-side module that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker's choosing.
Credit: eb41dac7-0af8-4f84-9f6d-0272772514f4
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut MF | ||
All of | ||
Any of | ||
PaperCut MF | <20.1.10 | |
PaperCut MF | >=21.0.0<21.2.14 | |
PaperCut MF | >=22.0.0<22.1.5 | |
PaperCut MF | >=23.0.1<23.0.7 | |
PaperCut NG | <20.1.10 | |
PaperCut NG | >=21.0.0<21.2.14 | |
PaperCut NG | >=22.0.0<22.1.5 | |
PaperCut NG | >=23.0.1<23.0.7 | |
Any of | ||
Apple iOS and macOS | ||
Linux Kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1884 is classified as a high severity Server-Side Request Forgery (SSRF) vulnerability.
To fix CVE-2024-1884, update PaperCut NG/MF to the latest version available, ensuring it is beyond the specified vulnerable versions.
CVE-2024-1884 affects various versions of PaperCut NG/MF including those below 20.1.10 and between the ranges of 21.0.0 to 21.2.14, 22.0.0 to 22.1.5, and 23.0.1 to 23.0.7.
CVE-2024-1884 is categorized as a Server-Side Request Forgery (SSRF) vulnerability.
Yes, CVE-2024-1884 can be exploited remotely, allowing attackers to induce the server-side application to make HTTP requests to arbitrary domains.