Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-27350 PoC — PaperCut NG 访问控制错误漏洞

Source
Associated Vulnerability
Title:PaperCut NG 访问控制错误漏洞 (CVE-2023-27350)
Description:PaperCut NG是澳大利亚PaperCut公司的一套下一代打印机控制软件。 PaperCut NG 22.0.5版本存在访问控制错误漏洞,该漏洞源于访问控制不当,攻击者利用该漏洞可以绕过身份验证并在系统上下文中执行任意代码。
Readme
# CVE-2023-27350-POC

![ezgif com-video-to-gif](https://user-images.githubusercontent.com/106005322/233806990-c8b9d161-8e14-4f7a-bbf4-01aeeaecbc02.gif)
#

### Description:

This tool is designed to exploit an authentication bypass vulnerability in PaperCut MF/NG versions 8.0 and above, but prior to versions 20.1.7, 21.2.11, or 22.0.9. The vulnerability allows for unauthorized access to the system and can potentially be used for malicious purposes.

### Installation:

1) ```git clone https://github.com/TamingSariMY/CVE-2023-27350-POC.git```
2) ```pip install pyfiglet```

### Usage:

1) python3 vuln.py
2) Enter the Ip Address: ```xx.xx.xx.xx```

### Shodan Dorks:

1) http.html:"papercut"
2) http.html:"papercut" port:9191
3) http.title:"PaperCut Login"

### POC:

https://user-images.githubusercontent.com/106005322/233808986-b6686748-c57b-41b9-bf71-fb73474295eb.MOV

### Reference:

##### https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software
##### https://arcticwolf.com/resources/blog/cve-2023-27350/

File Snapshot

[4.0K] /data/pocs/33b49c7199573cdb8d48f16389d91dddbf1448b3 ├── [1.0K] README.md └── [1.3K] vuln.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.