CVE-2023-39470
PaperCut NG print.script.sandboxed Exposed Dangerous Function Remote Code Execution Vulnerability
CVSS Score
7.2
EPSS Score
0.0%
EPSS Percentile
0th
PaperCut NG print.script.sandboxed Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PaperCut NG. Authentication is required to exploit this vulnerability. The specific flaw exists within the management of the print.script.sandboxed setting. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20965.
| CWE | CWE-749 |
| Vendor | papercut |
| Product | ng |
| Published | Nov 22, 2024 |
| Last Updated | Dec 5, 2024 |
Stay Ahead of the Next One
Get instant alerts for papercut ng
Be the first to know when new high vulnerabilities affecting papercut ng are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Affected Versions
PaperCut / NG
22.0.10 65996