A Path Traversal vulnerability exists in PaperCut NG before 22.1.1 and PaperCut MF before 22.1.1. Under specific conditions, this could potentially allow an authenticated attacker to achieve read-only access to the server's filesystem, because requests beginning with "GET /ui/static/..//.." reach getStaticContent in UIContentResource.class in the static-content-files servlet.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://www.papercut.com/kb/Main/PO-1216-and-PO-1219#security-notifications | vendor advisory |
https://www.papercut.com/kb/Main/SecurityBulletinJune2023 | vendor advisory |
https://research.aurainfosec.io/disclosure/papercut/ | third party advisory |
https://web.archive.org/web/20230814061444/https://research.aurainfosec.io/disclosure/papercut/ | third party advisory |