Overview
- Description
- An arbitrary file deletion vulnerability exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. To exploit this vulnerability, an attacker must first obtain local login access to the Windows Server hosting PaperCut NG/MF and be capable of executing low-privilege code directly on the server via the web-print-hot-folder. Important: In most installations, this risk is mitigated by the default Windows Server configuration, which restricts local login access to Administrators only. However, this vulnerability could pose a risk to customers who allow non-administrative users to log into the local console of the Windows environment hosting the PaperCut NG/MF application server. Note: This CVE has been split from CVE-2024-3037.
- Source
- eb41dac7-0af8-4f84-9f6d-0272772514f4
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AE8A9B5-11C6-4FE2-B672-0EC6EF8075CC", "versionEndExcluding": "23.0.9" }, { "criteria": "cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA96610E-7518-4215-B5FF-1B4444BE2DA4", "versionEndExcluding": "23.0.9" } ], "operator": "OR" } ] } ]