Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-1221

Summary
Assigner-PaperCut
Assigner Org ID-eb41dac7-0af8-4f84-9f6d-0272772514f4
Published At-14 Mar, 2024 | 03:01
Updated At-26 Sep, 2024 | 03:46
Rejected At-
Credits

Improper access controls on APIs on Linux and macOS in PaperCut NG/MF

This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:PaperCut
Assigner Org ID:eb41dac7-0af8-4f84-9f6d-0272772514f4
Published At:14 Mar, 2024 | 03:01
Updated At:26 Sep, 2024 | 03:46
Rejected At:
▼CVE Numbering Authority (CNA)
Improper access controls on APIs on Linux and macOS in PaperCut NG/MF

This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.

Affected Products
Vendor
PaperCut Software Pty LtdPaperCut
Product
PaperCut NG, PaperCut MF
Platforms
  • MacOS
  • Linux
Default Status
affected
Versions
Affected
  • From 0 before 23.0.7 (custom)
    • -> unaffectedfrom23.0.7
  • From 0 before 22.1.5 (custom)
    • -> unaffectedfrom22.1.5
  • From 0 before 21.2.14 (custom)
    • -> unaffectedfrom21.2.14
  • From 0 before 20.1.10 (custom)
    • -> unaffectedfrom20.1.10
Problem Types
TypeCWE IDDescription
CWECWE-76CWE-76 Improper Neutralization of Equivalent Special Elements
Type: CWE
CWE ID: CWE-76
Description: CWE-76 Improper Neutralization of Equivalent Special Elements
Metrics
VersionBase scoreBase severityVector
3.13.1LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Version: 3.1
Base score: 3.1
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-131CAPEC-131 Resource Leak Exposure
CAPEC ID: CAPEC-131
Description: CAPEC-131 Resource Leak Exposure
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.papercut.com/kb/Main/Security-Bulletin-March-2024
N/A
Hyperlink: https://www.papercut.com/kb/Main/Security-Bulletin-March-2024
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.papercut.com/kb/Main/Security-Bulletin-March-2024
x_transferred
Hyperlink: https://www.papercut.com/kb/Main/Security-Bulletin-March-2024
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:eb41dac7-0af8-4f84-9f6d-0272772514f4
Published At:14 Mar, 2024 | 03:15
Updated At:23 Jan, 2025 | 20:15

This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.13.1LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Primary3.13.1LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 3.1
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Type: Primary
Version: 3.1
Base score: 3.1
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
CPE Matches

PaperCut Software Pty Ltd
papercut
>>papercut_mf>>Versions before 20.1.10(exclusive)
cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*
PaperCut Software Pty Ltd
papercut
>>papercut_mf>>Versions from 21.0.0(inclusive) to 21.2.14(exclusive)
cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*
PaperCut Software Pty Ltd
papercut
>>papercut_mf>>Versions from 22.0.0(inclusive) to 22.1.5(exclusive)
cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*
PaperCut Software Pty Ltd
papercut
>>papercut_mf>>Versions from 23.0.1(inclusive) to 23.0.7(exclusive)
cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*
PaperCut Software Pty Ltd
papercut
>>papercut_ng>>Versions before 20.1.10(exclusive)
cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*
PaperCut Software Pty Ltd
papercut
>>papercut_ng>>Versions from 21.0.0(inclusive) to 21.2.14(exclusive)
cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*
PaperCut Software Pty Ltd
papercut
>>papercut_ng>>Versions from 22.0.0(inclusive) to 22.1.5(exclusive)
cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*
PaperCut Software Pty Ltd
papercut
>>papercut_ng>>Versions from 23.0.1(inclusive) to 23.0.7(exclusive)
cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>macos>>-
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>-
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-76Secondaryeb41dac7-0af8-4f84-9f6d-0272772514f4
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: CWE-76
Type: Secondary
Source: eb41dac7-0af8-4f84-9f6d-0272772514f4
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.papercut.com/kb/Main/Security-Bulletin-March-2024eb41dac7-0af8-4f84-9f6d-0272772514f4
Vendor Advisory
https://www.papercut.com/kb/Main/Security-Bulletin-March-2024af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: https://www.papercut.com/kb/Main/Security-Bulletin-March-2024
Source: eb41dac7-0af8-4f84-9f6d-0272772514f4
Resource:
Vendor Advisory
Hyperlink: https://www.papercut.com/kb/Main/Security-Bulletin-March-2024
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

3Records found

CVE-2023-23472
Matching Score-8
Assigner-IBM Corporation
ShareView Details
Matching Score-8
Assigner-IBM Corporation
CVSS Score-3.1||LOW
EPSS-0.07% / 22.25%
||
7 Day CHG~0.00%
Published-11 Dec, 2024 | 12:14
Updated-11 Mar, 2025 | 17:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM InfoSphere Information Server information disclosure

IBM InfoSphere DataStage Flow Designer (InfoSphere Information Server 11.7) could allow an authenticated user to obtain sensitive information that could aid in further attacks against the system.

Action-Not Available
Vendor-IBM CorporationMicrosoft CorporationLinux Kernel Organization, Inc
Product-aixinfosphere_information_serverlinux_kernelwindowsInfoSphere Information Server
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2024-1882
Matching Score-6
Assigner-PaperCut Software Pty Ltd
ShareView Details
Matching Score-6
Assigner-PaperCut Software Pty Ltd
CVSS Score-7.2||HIGH
EPSS-9.16% / 92.36%
||
7 Day CHG~0.00%
Published-14 Mar, 2024 | 03:08
Updated-23 Jan, 2025 | 20:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server-side resource injection in PaperCut NG/MF

This vulnerability allows an already authenticated admin user to create a malicious payload that could be leveraged for remote code execution on the server hosting the PaperCut NG/MF application server.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationPaperCut Software Pty LtdLinux Kernel Organization, Inc
Product-papercut_mfmacoswindowslinux_kernelpapercut_ngPaperCut NG, PaperCut MFpapercut_mfpapercut_ng
CWE ID-CWE-76
Improper Neutralization of Equivalent Special Elements
CVE-2024-1883
Matching Score-6
Assigner-PaperCut Software Pty Ltd
ShareView Details
Matching Score-6
Assigner-PaperCut Software Pty Ltd
CVSS Score-6.3||MEDIUM
EPSS-45.24% / 97.51%
||
7 Day CHG~0.00%
Published-14 Mar, 2024 | 03:09
Updated-23 Jan, 2025 | 21:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Reflected XSS in PaperCut NG/MF

This is a reflected cross site scripting vulnerability in the PaperCut NG/MF application server. An attacker can exploit this weakness by crafting a malicious URL that contains a script. When an unsuspecting user clicks on this malicious link, it could potentially lead to limited loss of confidentiality, integrity or availability.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationPaperCut Software Pty LtdLinux Kernel Organization, Inc
Product-papercut_mfmacoswindowslinux_kernelpapercut_ngPaperCut NG, PaperCut MF
CWE ID-CWE-76
Improper Neutralization of Equivalent Special Elements
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Details not found