TLP : CLEAR
Date : 19/03/2024
REF NO : CERT / 2024/03/21
Severity Level: Medium
Components Affected
Overview
Multiple vulnerabilities were identified in PaperCut. A remote attacker could exploit some of these vulnerabilities to trigger cross-site scripting, elevation of privilege, remote code execution, sensitive information disclosure and spoofing on the targeted system.
Description
PaperCut NG/MF is plagued by critical security flaws, including Server-Side Request Forgery (SSRF), Reflected Cross-Site Scripting (XSS), and Remote Code Execution (RCE). Attackers exploit SSRF to manipulate the server into making unauthorized HTTP requests. XSS vulnerabilities enable attackers to craft malicious URLs, compromising user confidentiality and system integrity. Authenticated admin users can abuse RCE to execute arbitrary code on the server, potentially causing severe damage. Additionally, unauthorized write operations and API authorization bypasses further escalate risks. Immediate remediation is imperative to safeguard PaperCut NG/MF systems from exploitation and mitigate the potential consequences of these vulnerabilities.
Impact
Solution/ Workarounds
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
Reference
Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.
Sri Lanka Computer Emergency Readiness Team | Coordination Centre