vulnerability
CVE-2023-27350: PO-1216: Papercut Remote Code Execution - Remote
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:H/Au:N/C:C/I:C/A:C) | Apr 20, 2023 | May 17, 2023 | May 17, 2023 |
Severity
6
CVSS
(AV:L/AC:H/Au:N/C:C/I:C/A:C)
Published
Apr 20, 2023
Added
May 17, 2023
Modified
May 17, 2023
Description
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. This vulnerability check uses the build number that is exposed by the web appliction to determine vulnerability status.
Solution
papercut-march-2023-upgrade-to-recommended-version
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.