关联漏洞
介绍
# CVE-2023-27350-POC

#
### Description:
This tool is designed to exploit an authentication bypass vulnerability in PaperCut MF/NG versions 8.0 and above, but prior to versions 20.1.7, 21.2.11, or 22.0.9. The vulnerability allows for unauthorized access to the system and can potentially be used for malicious purposes.
### Installation:
1) ```git clone https://github.com/TamingSariMY/CVE-2023-27350-POC.git```
2) ```pip install pyfiglet```
### Usage:
1) python3 vuln.py
2) Enter the Ip Address: ```xx.xx.xx.xx```
### Shodan Dorks:
1) http.html:"papercut"
2) http.html:"papercut" port:9191
3) http.title:"PaperCut Login"
### POC:
https://user-images.githubusercontent.com/106005322/233808986-b6686748-c57b-41b9-bf71-fb73474295eb.MOV
### Reference:
##### https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software
##### https://arcticwolf.com/resources/blog/cve-2023-27350/
文件快照
[4.0K] /data/pocs/68010499b80829d6f5cf5d9aadf0661363aa867c
├── [1.0K] README.md
└── [1.3K] vuln.py
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。