一、 漏洞 CVE-2023-27350 基础信息
漏洞标题
N/A
来源:AIGC 神龙大模型
漏洞描述信息
这个漏洞允许远程攻击者绕过受影响的 PaperCut NG 22.0.5 (Build 63914) installations的认证。无需认证就可以利用这个漏洞进行攻击。这个漏洞的具体缺陷存在于 SetupCompleted 类中。这个问题是由于错误的访问控制导致的。攻击者可以利用这个漏洞绕过认证,在系统上下文中执行任意代码。此漏洞被报告为 ZDI-CAN-18987。
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
来源:AIGC 神龙大模型
漏洞类别
N/A
来源:AIGC 神龙大模型
漏洞标题
N/A
来源:美国国家漏洞数据库 NVD
漏洞描述信息
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
访问控制不恰当
来源:美国国家漏洞数据库 NVD
漏洞标题
PaperCut NG 访问控制错误漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
PaperCut NG是澳大利亚PaperCut公司的一套下一代打印机控制软件。 PaperCut NG 22.0.5版本存在访问控制错误漏洞,该漏洞源于访问控制不当,攻击者利用该漏洞可以绕过身份验证并在系统上下文中执行任意代码。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
授权问题
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2023-27350 的公开POC
# POC 描述 源链接 神龙链接
1 A simple python script to check if a service is vulnerable https://github.com/MaanVader/CVE-2023-27350-POC POC详情
2 None https://github.com/0ximan1337/CVE-2023-27350-POC POC详情
3 Proof of Concept Exploit for PaperCut CVE-2023-27350 https://github.com/horizon3ai/CVE-2023-27350 POC详情
4 Exploit for Papercut CVE-2023-27350. [+] Reverse shell [+] Mass checking https://github.com/adhikara13/CVE-2023-27350 POC详情
5 Perfom With Massive Authentication Bypass In PaperCut MF/NG https://github.com/ThatNotEasy/CVE-2023-27350 POC详情
6 Python 2.7 https://github.com/Jenderal92/CVE-2023-27350 POC详情
7 None https://github.com/imancybersecurity/CVE-2023-27350-POC POC详情
8 None https://github.com/ASG-CASTLE/CVE-2023-27350 POC详情
9 None https://github.com/rasan2001/CVE-2023-27350 POC详情
10 None https://github.com/rasan2001/CVE-2023-27350-Ongoing-Exploitation-of-PaperCut-Remote-Code-Execution-Vulnerability POC详情
11 Unauthenticated remote command execution in Papercut service allows an attacker to execute commands due to improper access controls in the SetupCompleted Java class. https://github.com/monke443/CVE-2023-27350 POC详情
12 This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-27350.yaml POC详情
13 PoC for CVE-2023-27350 https://github.com/0xB0y426/CVE-2023-27350-PoC POC详情
三、漏洞 CVE-2023-27350 的情报信息