New PaperCut NG/MF Flaw Let Attackers Execute Code on Unpatched Windows Servers

A Critical vulnerability was discovered in the widely used PaperCut MG/ NF print management software running on Windows prior to version 22.1.3.

As of the July 2023 security bulletin, patches have been released by PaperCut to fix this vulnerability. PaperCut is a widely used print management software that has two different software as, MG and NF.

PaperCut is a printing management and control tool, while NF is a versatile solution that offers printing, copying, scanning, and specialty printing capabilities.

CVE-2023-39143: Chained Path Traversal in Authenticated API

On certain configurations, this vulnerability enables an unauthenticated attacker to potentially read, write and upload arbitrary files resulting in remote code execution.

The CVSS Score for this vulnerability is yet to be confirmed.

Configuration Required Exploitation

As reported, servers running on Windows platforms that have the external device integration setting enabled are vulnerable to this remote code execution through file upload.

This setting is enabled by default on certain PaperCut installations such as PaperCut NG Commercial version or PaperCut MF.

Detection

This vulnerability can be detected using the following command, which checks if the server is patched and whether it is running on Windows.

curl -w “%{http_code}” -k –path-as-is “https://<IP>:<port>/custom-report-example/..\..\..\deployment\sharp\icons\home-app.png”

A 200 response to this command indicates that the server is not patched and vulnerable, and a 404 response states that the server is patched and not vulnerable.

Users of these products are recommended to upgrade to the latest version of PaperCut NG/MF, version 22.1.3. As a workaround, users can also configure an allowlist of IP addresses that are permitted to connect with the PaperCut server.

Keep informed about the latest Cyber Security News by following us on GoogleNews, Linkedin, Twitter, and Facebook.

Eswar

Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

Phobos Ransomware Admin as Part of International Hacking Operation

The U.S. Department of Justice unsealed criminal charges today against Evgenii Ptitsyn, a 42-year-old Russian national…

13 hours ago

Maxar Space Data Leak, Threat Actors Gain Unauthorized Access to the System

Maxar Space Systems, a leader in space technology and Earth intelligence solutions, has recently confirmed…

16 hours ago

Apache Kafka Vulnerability Let Attackers Escalate Privileges

A newly identified vulnerability tracked as CVE-2024-31141, has been discovered in Apache Kafka Clients that could allow attackers…

17 hours ago

Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability

Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL injection…

2 days ago

Citrix Virtual Apps & Desktops Zero-Day Vulnerability Exploited in the Wild

A critical new vulnerability has been discovered in Citrix’s Virtual Apps and Desktops solution, which…

2 days ago

Sonatype Nexus Repository Manager Hit by RCE & XSS Vulnerability

Sonatype, the company behind the popular Nexus Repository Manager, has issued security advisories addressing two…

2 days ago