HTTP: PaperCut NG External User Lookup Code Injection

This signature detects attempts to exploit a known vulnerability against PaperCut NG. A successful attack can lead to arbitrary code execution

Extended Description

PaperCut NG External User Lookup Code Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PaperCut NG. Authentication is required to exploit this vulnerability. The specific flaw exists within the External User Lookup functionality. The issue results from the lack of proper validation of a user-supplied string before using it to execute Java code. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-21013.

Affected Products

Papercut papercut_ng

Short Name
HTTP:CTS:PPR-CUT-CD-INJ
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2023-39469 Code External Injection Lookup NG PaperCut User
Release Date
12/15/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3779
False Positive
Unknown
Vendors

Papercut

Found a potential security threat?