目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2023-27350 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
访问控制不恰当
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
PaperCut NG 访问控制错误漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
PaperCut NG是澳大利亚PaperCut公司的一套下一代打印机控制软件。 PaperCut NG 22.0.5版本存在访问控制错误漏洞,该漏洞源于访问控制不当,攻击者利用该漏洞可以绕过身份验证并在系统上下文中执行任意代码。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
PaperCutNG 22.0.5 (Build 63914) -
二、漏洞 CVE-2023-27350 的公开POC
#POC 描述源链接神龙链接
1A simple python script to check if a service is vulnerablehttps://github.com/MaanVader/CVE-2023-27350-POCPOC详情
2Nonehttps://github.com/0ximan1337/CVE-2023-27350-POCPOC详情
3Proof of Concept Exploit for PaperCut CVE-2023-27350https://github.com/horizon3ai/CVE-2023-27350POC详情
4Exploit for Papercut CVE-2023-27350. [+] Reverse shell [+] Mass checkinghttps://github.com/adhikara13/CVE-2023-27350POC详情
5Perfom With Massive Authentication Bypass In PaperCut MF/NGhttps://github.com/ThatNotEasy/CVE-2023-27350POC详情
6Python 2.7https://github.com/Jenderal92/CVE-2023-27350POC详情
7Nonehttps://github.com/imancybersecurity/CVE-2023-27350-POCPOC详情
8Nonehttps://github.com/ASG-CASTLE/CVE-2023-27350POC详情
9Nonehttps://github.com/rasan2001/CVE-2023-27350POC详情
10Nonehttps://github.com/rasan2001/CVE-2023-27350-Ongoing-Exploitation-of-PaperCut-Remote-Code-Execution-VulnerabilityPOC详情
11Unauthenticated remote command execution in Papercut service allows an attacker to execute commands due to improper access controls in the SetupCompleted Java class.https://github.com/monke443/CVE-2023-27350POC详情
12This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-27350.yamlPOC详情
13PoC for CVE-2023-27350https://github.com/0xB0y426/CVE-2023-27350-PoCPOC详情
14Papercut Vulnerability, Affected Versions are PaperCut MF or NG version 8.0 or later (excluding patched versions) on all OS platforms. https://github.com/Royall-Researchers/CVE-2023-27350POC详情
15PaperCut NG/MG Authentication Bypass and Remote Code Execution (RCE) Exploit Tool. A standalone Bash implementation of the PaperCut exploit chain, featuring optional proxy support, automated session elevation, and dynamic command injection via the print scripting engine. Designed for security auditing and authorized penetration testing.https://github.com/dezso-dfield/CVE-2023-27350POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2023-27350 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-27350

暂无评论


发表评论