Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-27350 PoC — PaperCut NG 访问控制错误漏洞

Source
Associated Vulnerability
Title:PaperCut NG 访问控制错误漏洞 (CVE-2023-27350)
Description:PaperCut NG是澳大利亚PaperCut公司的一套下一代打印机控制软件。 PaperCut NG 22.0.5版本存在访问控制错误漏洞,该漏洞源于访问控制不当,攻击者利用该漏洞可以绕过身份验证并在系统上下文中执行任意代码。
Description
PoC for CVE-2023-27350
Readme
# CVE-2023-27350

This PoC demonstrates how it’s possible to bypass authentication in PaperCut MF/NG versions starting from 8.0 up to, but not including, 20.1.7, 21.2.11, and 22.0.9. It allows interaction with the system without using valid login credentials.

# Shodan Prompts

1. http.html:"papercut"
2. http.html:"papercut" port:9191
3. http.title:"PaperCut Login"

# Usage

python cve-2023-27350.py 127.0.0.1



https://nvd.nist.gov/vuln/detail/CVE-2023-27350

File Snapshot

[4.0K] /data/pocs/6eb9acb827bbc7a97ccf137ce4f8b2e0f07a2889 ├── [1.9K] cve-2023-27350.py └── [ 467] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.