The `PaperCutNG Mobility Print` version 1.0.3512 application allows an
unauthenticated attacker to perform a CSRF attack on an instance
administrator to configure the clients host (in the "configure printer
discovery" section). This is possible because the application has no
protections against CSRF attacks, like Anti-CSRF tokens, header origin
validation, samesite cookies, etc.
References
Link | Resource |
---|---|
https://fluidattacks.com/advisories/solveig/ | Exploit Third Party Advisory |
https://www.papercut.com/help/manuals/mobility-print/release-history/#mobility-print-server | Release Notes |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Fluid Attacks
Published: 2023-09-20T15:05:35.512Z
Updated: 2023-09-20T15:05:35.512Z
Reserved: 2023-05-03T22:24:15.839Z
Link: CVE-2023-2508
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-09-20T16:15:12.373
Modified: 2023-09-22T18:32:46.273
Link: CVE-2023-2508
JSON object: View
Redhat Information
No data.
CWE