Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-27350 PoC — PaperCut NG 访问控制错误漏洞

Source
Associated Vulnerability
Title:PaperCut NG 访问控制错误漏洞 (CVE-2023-27350)
Description:PaperCut NG是澳大利亚PaperCut公司的一套下一代打印机控制软件。 PaperCut NG 22.0.5版本存在访问控制错误漏洞,该漏洞源于访问控制不当,攻击者利用该漏洞可以绕过身份验证并在系统上下文中执行任意代码。
Description
Python 2.7
Readme
# CVE-2023-27350

Python 2.7

<b>Buy Coffee :</b>

<li>Bitcoin $: 31mtLHqhaXXyCMnT2EU73U8fwYwigiEEU1</li>
<li>Perfect Money $: U22270614</li>
<li>Saweria $: https://saweria.co/Shin403</li>
<li>Trakteer $: https://trakteer.id/shin403</li>

![Tak berjudul139](https://github.com/Jenderal92/CVE-2023-27350/assets/59664965/a7f96ef6-e7d7-467a-a2f7-4549aafd19d0)

Reff : https://nvd.nist.gov/vuln/detail/CVE-2023-27350

# Shodan Dork

<li>http.html:"papercut"</li>
<li>http.html:"papercut" port:9191</li>
<li>http.title:"PaperCut Login"</li>
File Snapshot

[4.0K] /data/pocs/e414d8896f361d965cfdfec481a4ff819a66c83d ├── [2.1K] papercutauth.py └── [ 536] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.