https://www.papercut.com/kb/Main/Security-Bulletin-March-2024 <br/></td> CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"/>https://www.papercut.com/kb/Main/Security-Bulletin-March-2024 <br/></td> CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"/>
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CWE-74)
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut MF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handleServiceException method. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system.
This vulnerability has a high severity with a CVSS v3 base score of 8.8. It allows remote attackers to bypass authentication on affected PaperCut MF installations. The impact includes high confidentiality, integrity, and availability risks. Successful exploitation could lead to unauthorized access to the system, potentially allowing attackers to view, modify, or delete sensitive information, or disrupt normal system operations.
One proof-of-concept exploit is available on zerodayinitiative.com. There is no evidence of proof of exploitation at the moment.
PaperCut has issued an update to correct this vulnerability. More details can be found at: https://www.papercut.com/kb/Main/Security-Bulletin-March-2024
1. Apply the patch provided by PaperCut as soon as possible. 2. Implement strong user education to avoid visiting malicious pages or opening suspicious files. 3. Consider implementing additional network security measures to detect and prevent potential exploitation attempts. 4. Regularly monitor system logs for any suspicious authentication activities. 5. Implement the principle of least privilege to minimize the potential impact of a successful attack.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
NVD published the first details for CVE-2024-1883
Feedly found the first article mentioning CVE-2024-1883. See article
EPSS Score was set to: 0.04% (Percentile: 7.2%)
Detection for the vulnerability has been added to Qualys (379515)
Feedly estimated the CVSS score as HIGH
A CVSS base score of 6.3 has been assigned.
Feedly estimated the CVSS score as MEDIUM