9.8
CVSSv3

CVE-2023-27350

Published: 20/04/2023 Updated: 07/06/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

This vulnerability allows remote malicious users to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

papercut papercut ng

papercut papercut mf

Exploits

PaperCut NG/MG version 2204 suffers from an authentication bypass vulnerability ...
This Metasploit module leverages an authentication bypass in PaperCut NG If necessary it updates Papercut configuration options, specifically the print-and-de vicescriptenabled and printscriptsandboxed options to allow for arbitrary code execution running in the builtin RhinoJS engine This module logs at most 2 events in the application log o ...

Github Repositories

Content for the Attack Surface Management workshop at Educause CPPC 2023

ASM - Attack Surface Management Content for the Attack Surface Management workshop at Educause CPPC 2023 Slides (PDF, 37MB) - umdboxcom/s/6lyqa1uw1mcirjxzwfuv4ctalxen2aaz Submit your findings here: formsgle/RSEorumSMFMBno8i9 Sample nmap searches nmap target nmap -p22 *target* nmap -p22 -sV *target* nmap –p 443 --script ssl-enum-ciphers *target* nmap &nd

Exploit for Papercut CVE-2023-27350. [+] Reverse shell [+] Mass checking

CVE-2023-27350 Exploit POCThis is a Proof of Concept (POC) exploit for CVE-2023-27350, a vulnerability found in PaperCut MF/NG that allows an unauthenticated attacker to execute arbitrary code with SYSTEM privilegesRequirementsBefore using this exploit, make sure you have installed the following libraries:pip install -r requirementstxt Usagepython CVE-2023-27350py -u &lt

Proof of Concept Exploit for PaperCut CVE-2023-27350

CVE-2023-27350 POC for CVE-2023-27350 affecting PaperCut MF/NG Technical Analysis A technical root cause analysis of the vulnerability, indicators of compromise, and internet exposure can be found on our blog: wwwhorizon3ai/papercut-cve-2023-27350-deep-dive-and-indicators-of-compromise Summary This POC uses an authentication bypass vulnerability chained with abuse of

A repository of example ronin exploits

example-exploits This is a ronin repository containing example/demo exploits using ronin-exploits A ronin repository is simply a git repository that may contain certain directories, such as exploits/ or payloads/, that contain Ruby classes Install This git repository can be installed by the ronin-repos install command: ronin-repos install githubcom/ronin-rb/example-e

A simple python script to check if a service is vulnerable

CVE-2023-27350-POC A python script tht searches for vulnerable version of PaperCut MF/NG More information can be found here: wwwhuntresscom/blog/critical-vulnerabilities-in-papercut-print-management-software Note: This was created for educational use only Use at your own risk

Perfom With Massive Authentication Bypass In PaperCut MF/NG

CVE-2023-27350 The tool is designed specifically for Massive Authentication Bypass (Papecut MF/NG), which refers to a process of circumventing or bypassing authentication mechanisms on a large scale Screenshot Requirements Python37+ Supported Os Linuxer Wingays Get start with $ git clone githubcom/Pari-Malam/CVE-2023-27350 $ cd CVE-2023-27350 $ pip/pip3 instal

Perfom With Massive Authentication Bypass In PaperCut MF/NG

CVE-2023-27350 The tool is designed specifically for Massive Authentication Bypass (Papecut MF/NG), which refers to a process of circumventing or bypassing authentication mechanisms on a large scale Screenshot Requirements Python37+ Supported Os Linuxer Wingays Get start with $ git clone githubcom/Pari-Malam/CVE-2023-27350 $ cd CVE-2023-27350 $ pip/pip3 instal

CVE-2023-27350-POC Description: This tool is designed to exploit an authentication bypass vulnerabilit

Python 2.7

CVE-2023-27350 Python 27 Buy Coffee : Bitcoin $: 31mtLHqhaXXyCMnT2EU73U8fwYwigiEEU1 Perfect Money $: U22270614 Saweria $: saweriaco/Shin403 Trakteer $: trakteerid/shin403 Reff : nvdnistgov/vuln/detail/CVE-2023-27350 Shodan Dork httphtml:"papercut" httphtml:"papercut" port:9191 httptitle:"PaperCut Login"

CVE-2023-27350 This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 2205 (Build 63914) Authentication is not required to exploit this vulnerability The specific flaw exists within the SetupCompleted class The issue results from improper access control An attacker can leverage this vulnerability to bypass authenticati

Recent Articles

Buhti: New Ransomware Operation Relies on Repurposed Payloads
Symantec Threat Intelligence Blog • Threat Hunter Team • 25 May 2024

Attackers use rebranded variants of leaked LockBit and Babuk ransomware payloads but use own custom exfiltration tool.

Posted: 25 May, 20235 Min ReadThreat Intelligence SubscribeFollowtwitterlinkedinBuhti: New Ransomware Operation Relies on Repurposed PayloadsAttackers use rebranded variants of leaked LockBit and Babuk ransomware payloads but use own custom exfiltration tool.A relatively new ransomware operation calling itself Buhti appears to be eschewing developing its own payload and is instead utilizing variants of the leaked LockBit and Babuk ransomware families to ...

IT threat evolution in Q2 2023. Non-mobile statistics
Securelist • AMR • 30 Aug 2023

IT threat evolution in Q2 2023 IT threat evolution in Q2 2023. Non-mobile statistics IT threat evolution in Q2 2023. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q2 2023: Kaspersky solutions blocked 801,934,281 attacks from online resources across the globe. A total of 209,716,810 unique links were detected by Web ...

LockBit victims in the US alone paid over $90m in ransoms since 2020
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources As America, UK, Canada, Australia and friends share essential bible to detect and thwart infections

Seven nations today issued an alert, plus protection tips, about LockBit, the prolific ransomware-as-a-service gang. The group's affiliates remains a global scourge, costing US victims alone more than $90 million from roughly 1,700 attacks since 2020, we're told. The joint security advisory — issued by the US Cybersecurity and Infrastructure Security Agency (CISA), FBI, Multi-State Information Sharing and Analysis Center (MS-ISAC), and cybersecurity authorities in Australia, Canada, the UK, Ge...