Lucene search

K
saintSAINT CorporationSAINT:265661B74BC72F0361AE7BB83EAC4EA3
HistoryMay 12, 2023 - 12:00 a.m.

PaperCut authentication bypass

2023-05-1200:00:00
SAINT Corporation
my.saintcorporation.com
72
papercut
authentication bypass
vulnerability
setupcompleted class
remote attacker
arbitrary code
system
upgrade
windows
exploit

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.971 High

EPSS

Percentile

99.8%

Added: 05/12/2023

Background

PaperCut is print management software. It includes a web interface written in Java.

Problem

An authentication bypass vulnerability in the **SetupCompleted** class allows a remote, unauthenticated attacker to execute arbitrary code in the context of SYSTEM.

Resolution

Upgrade to PaperCut MF or NG 20.1.7, 21.2.11, or 22.0.9 or higher (build 65657 or higher).

References

<https://www.papercut.com/kb/Main/PO-1216-and-PO-1219&gt;
<https://www.horizon3.ai/papercut-cve-2023-27350-deep-dive-and-indicators-of-compromise/&gt;

Platforms

Windows

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.971 High

EPSS

Percentile

99.8%