An authentication bypass exists in PaperCut NG versions 22.0.12 and prior that could allow a remote, unauthenticated attacker to upload arbitrary files to the PaperCut NG host’s file storage. This could exhaust system resources and prevent the service from operating as expected.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://www.tenable.com/security/research/tra-2023-23 | third party advisory |
https://www.papercut.com/kb/Main/SecurityBulletinJuly2023/ | vendor advisory |