First published: Tue Jun 18 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PaperCut NG. Authentication is required to exploit this vulnerability. The specific flaw exists within the management of the print.script.sandboxed setting. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut NG/MF |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-24-786 has been rated as critical due to its potential for remote code execution.
To mitigate ZDI-24-786, ensure that you update PaperCut NG to the latest version provided by the vendor.
ZDI-24-786 specifically impacts installations of PaperCut NG that have not been patched.
Yes, authentication is required to exploit the ZDI-24-786 vulnerability.
ZDI-24-786 is a remote code execution vulnerability affecting PaperCut NG.