Lucene search

K
zdiAnonymousZDI-24-784
HistoryJun 18, 2024 - 12:00 a.m.

PaperCut MF handleServiceException Cross-Site Scripting Authentication Bypass Vulnerability

2024-06-1800:00:00
Anonymous
www.zerodayinitiative.com
papercut mf
handleserviceexception
cross-site scripting
authentication bypass
remote attackers
user interaction

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.0%

This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut MF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handleServiceException method. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system.

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.0%

Related for ZDI-24-784