A Path Traversal vulnerability exists in PaperCut NG before 22.1.1 and PaperCut MF before 22.1.1. Under specific conditions, this could potentially allow an authenticated attacker to achieve read-only access to the server's filesystem, because requests beginning with "GET /ui/static/..//.." reach getStaticContent in UIContentResource.class in the static-content-files servlet.
References
Link | Resource |
---|---|
https://research.aurainfosec.io/disclosure/papercut/ | Third Party Advisory |
https://web.archive.org/web/20230814061444/https://research.aurainfosec.io/disclosure/papercut/ | Third Party Advisory |
https://www.papercut.com/kb/Main/PO-1216-and-PO-1219#security-notifications | Vendor Advisory |
https://www.papercut.com/kb/Main/SecurityBulletinJune2023 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-10-19 14:15
Updated : 2023-10-26 17:14
NVD link : CVE-2023-31046
Mitre link : CVE-2023-31046
CVE.ORG link : CVE-2023-31046
JSON object : View
Products Affected
papercut
- papercut_ng
- papercut_mf
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')