PaperCut.NG.SetupCompleted.Authentication.Bypass
Description
This indicates an attack attempt to exploit an Authentication Bypass Vulnerability in PaperCut NG.
This vulnerability is due to improper access control in the vulnerable application. An unauthenticated, remote attacker may be able to exploit this via a crafted request. Successful exploitation could lead to arbitrary code execution within the security context of the affected system.
Outbreak Alert
CVE-2023-27350 allows for an unauthenticated attacker to execute Remote Code Execution (RCE) on a PaperCut Application Server. Vulnerability exists within the SetupCompleted class and according to the vendor, this could be achieved remotely and without the need to log in.
Affected Products
PaperCut MF or NG version 8.0 or later
Impact
Security Bypass: Remote attackers can bypass security checks of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.papercut.com/kb/Main/PO-1216-and-PO-1219
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |