A Path Traversal vulnerability exists in PaperCut NG before 22.1.1 and PaperCut MF before 22.1.1. Under specific conditions, this could potentially allow an authenticated attacker to achieve read-only access to the server's filesystem, because requests beginning with "GET /ui/static/..//.." reach getStaticContent in UIContentResource.class in the static-content-files servlet.
References
Link | Resource |
---|---|
https://research.aurainfosec.io/disclosure/papercut/ | Third Party Advisory |
https://web.archive.org/web/20230814061444/https://research.aurainfosec.io/disclosure/papercut/ | Third Party Advisory |
https://www.papercut.com/kb/Main/PO-1216-and-PO-1219#security-notifications | Vendor Advisory |
https://www.papercut.com/kb/Main/SecurityBulletinJune2023 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-10-19T00:00:00
Updated: 2023-10-19T23:19:09.447605
Reserved: 2023-04-24T00:00:00
Link: CVE-2023-31046
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-10-19T14:15:08.883
Modified: 2023-10-26T17:14:53.670
Link: CVE-2023-31046
JSON object: View
Redhat Information
No data.
CWE