First published: Tue Mar 14 2023(Updated: )
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
PaperCut NG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-19226 is an authentication bypass vulnerability in PaperCut NG.
The vulnerability allows remote attackers to bypass authentication on affected installations by exploiting an improper implementation in the SecurityRequestFilter class.
No, authentication is not required to exploit this vulnerability.
The severity of the vulnerability is high, with a CVSS score of 8.2.
The vendor has released a patch for the vulnerability. It is recommended to update to the latest version of PaperCut NG.