Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-27350
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
访问控制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
PaperCut NG 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PaperCut NG是澳大利亚PaperCut公司的一套下一代打印机控制软件。 PaperCut NG 22.0.5版本存在访问控制错误漏洞,该漏洞源于访问控制不当,攻击者利用该漏洞可以绕过身份验证并在系统上下文中执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
PaperCutNG 22.0.5 (Build 63914) -
II. Public POCs for CVE-2023-27350
#POC DescriptionSource LinkShenlong Link
1A simple python script to check if a service is vulnerablehttps://github.com/MaanVader/CVE-2023-27350-POCPOC Details
2Nonehttps://github.com/0ximan1337/CVE-2023-27350-POCPOC Details
3Proof of Concept Exploit for PaperCut CVE-2023-27350https://github.com/horizon3ai/CVE-2023-27350POC Details
4Exploit for Papercut CVE-2023-27350. [+] Reverse shell [+] Mass checkinghttps://github.com/adhikara13/CVE-2023-27350POC Details
5Perfom With Massive Authentication Bypass In PaperCut MF/NGhttps://github.com/ThatNotEasy/CVE-2023-27350POC Details
6Python 2.7https://github.com/Jenderal92/CVE-2023-27350POC Details
7Nonehttps://github.com/imancybersecurity/CVE-2023-27350-POCPOC Details
8Nonehttps://github.com/ASG-CASTLE/CVE-2023-27350POC Details
9Nonehttps://github.com/rasan2001/CVE-2023-27350POC Details
10Nonehttps://github.com/rasan2001/CVE-2023-27350-Ongoing-Exploitation-of-PaperCut-Remote-Code-Execution-VulnerabilityPOC Details
11Unauthenticated remote command execution in Papercut service allows an attacker to execute commands due to improper access controls in the SetupCompleted Java class.https://github.com/monke443/CVE-2023-27350POC Details
12This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-27350.yamlPOC Details
13PoC for CVE-2023-27350https://github.com/0xB0y426/CVE-2023-27350-PoCPOC Details
14Papercut Vulnerability, Affected Versions are PaperCut MF or NG version 8.0 or later (excluding patched versions) on all OS platforms. https://github.com/Royall-Researchers/CVE-2023-27350POC Details
15PaperCut NG/MG Authentication Bypass and Remote Code Execution (RCE) Exploit Tool. A standalone Bash implementation of the PaperCut exploit chain, featuring optional proxy support, automated session elevation, and dynamic command injection via the print scripting engine. Designed for security auditing and authorized penetration testing.https://github.com/dezso-dfield/CVE-2023-27350POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-27350
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-27350

No comments yet


Leave a comment