The `PaperCutNG Mobility Print` version 1.0.3512 application allows an
unauthenticated attacker to perform a CSRF attack on an instance
administrator to configure the clients host (in the "configure printer
discovery" section). This is possible because the application has no
protections against CSRF attacks, like Anti-CSRF tokens, header origin
validation, samesite cookies, etc.
References
Link | Resource |
---|---|
https://fluidattacks.com/advisories/solveig/ | Exploit Third Party Advisory |
https://www.papercut.com/help/manuals/mobility-print/release-history/#mobility-print-server | Release Notes |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-09-20 16:15
Updated : 2023-09-22 18:32
NVD link : CVE-2023-2508
Mitre link : CVE-2023-2508
CVE.ORG link : CVE-2023-2508
JSON object : View
Products Affected
papercut
- mobility_print_server
apple
- macos
CWE
CWE-352
Cross-Site Request Forgery (CSRF)