First published: Mon Dec 09 2024(Updated: )
A reflected cross-site scripting (XSS) vulnerability exists in PaperCut NG/MF. This issue can be used to execute specially created JavaScript payloads in the browser. A user must click on a malicious link for this issue to occur.
Credit: eb41dac7-0af8-4f84-9f6d-0272772514f4
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut MF | ||
PaperCut NG/MF | ||
PaperCut MF | <24.1.1 | |
PaperCut NG | <24.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9672 has been classified as a reflected cross-site scripting (XSS) vulnerability, which can be exploited to execute arbitrary JavaScript in a user's browser.
To fix CVE-2024-9672, it is recommended to update PaperCut NG/MF to version 24.1.1 or later.
CVE-2024-9672 affects PaperCut NG and PaperCut MF versions up to 24.1.1.
Attackers can leverage CVE-2024-9672 to execute harmful JavaScript code in the context of a user's session, potentially stealing information or performing actions on their behalf.
Organizations using PaperCut NG or PaperCut MF should be concerned about CVE-2024-9672 due to the potential for exploitation through user interaction with malicious links.