A Cross-Site Request Forgery (CSRF) vulnerability has been identified in
PaperCut NG/MF, which, under specific conditions, could potentially enable
an attacker to alter security settings or execute arbitrary code. This could
be exploited if the target is an admin with a current login session. Exploiting
this would typically involve the possibility of deceiving an admin into clicking
a specially crafted malicious link, potentially leading to unauthorized changes.
References
Link | Resource |
---|---|
https://fluidattacks.com/advisories/arcangel/ | Exploit Third Party Advisory |
https://www.papercut.com/kb/Main/SecurityBulletinJune2023 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-06-20 15:15
Updated : 2023-07-06 06:15
NVD link : CVE-2023-2533
Mitre link : CVE-2023-2533
CVE.ORG link : CVE-2023-2533
JSON object : View
Products Affected
papercut
- papercut_ng
- papercut_mf
CWE
CWE-352
Cross-Site Request Forgery (CSRF)