Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-27350 PoC — PaperCut NG 访问控制错误漏洞

Source
Associated Vulnerability
Title:PaperCut NG 访问控制错误漏洞 (CVE-2023-27350)
Description:PaperCut NG是澳大利亚PaperCut公司的一套下一代打印机控制软件。 PaperCut NG 22.0.5版本存在访问控制错误漏洞,该漏洞源于访问控制不当,攻击者利用该漏洞可以绕过身份验证并在系统上下文中执行任意代码。
Description
A simple python script to check if a service is vulnerable
Readme
��# CVE-2023-27350-POC



A python script tht searches for vulnerable version of PaperCut MF/NG 



More information can be found here: https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software



# Note: This was created for educational use only. Use at your own risk
File Snapshot

[4.0K] /data/pocs/1cead370e56dc67d2ef60b703f6d86e20a1c2a0f ├── [1.1K] find-vuln-ver.py └── [ 604] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.