# N/A
## 概述
此漏洞允许远程攻击者绕过受影响的 PaperCut NG 22.0.5 (构建 63914) 安装的认证。利用此漏洞不需要进行身份验证。具体缺陷存在于 `SecurityRequestFilter` 类中,由于认证算法实现不当导致问题。攻击者可利用此漏洞绕过系统认证。
## 影响版本
- PaperCut NG 22.0.5 (Build 63914)
## 细节
该漏洞存在于 `SecurityRequestFilter` 类中,由于认证算法实现不当,导致攻击者可以绕过认证系统。无需身份验证即可利用此漏洞。
## 影响
攻击者可以利用此漏洞绕过系统的身份验证机制,从而在未经授权的情况下访问系统。
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SecurityRequestFilter class. The issue results from improper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19226. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-27351.yaml | POC详情 |
暂无评论