HTTP: PaperCut NG Remote Code Injection

This signature detects attempts to exploit a known vulnerability against PaperCut NG. A successful attack can lead to arbitrary code execution.

Extended Description

This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.

Affected Products

Papercut papercut_ng

Short Name
HTTP:CTS:PAPERCUT-AUTH-RCE
Severity
Major
Recommended
True
Recommended Action
None
Category
HTTP
Keywords
CVE-2023-27350 CVE-2023-3486 CVE-2023-39143 CVE-2024-1222 Code Injection NG PaperCut Remote
Release Date
05/05/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3820
False Positive
Unknown
Vendors

Papercut

Found a potential security threat?