We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-3037

Arbitrary File Deletion in PaperCut NG/MF Web Print



AssignerPaperCut
Reserved2024-03-28
Published2024-05-14
Updated2024-10-07

Description

An arbitrary file deletion vulnerability exists in PaperCut NG/MF, specifically affecting Windows servers with Web Print enabled. To exploit this vulnerability, an attacker must first obtain local login access to the Windows Server hosting PaperCut NG/MF and be capable of executing low-privilege code directly on the server. Important: In most installations, this risk is mitigated by the default Windows Server configuration, which typically restricts local login access to Administrators only. However, this vulnerability could pose a risk to customers who allow non-administrative users to log in to the local console of the Windows environment hosting the PaperCut NG/MF application server. Note: This CVE has been split into two separate CVEs (CVE-2024-3037 and CVE-2024-8404) and it’s been rescored with a "Privileges Required (PR)" rating of low, and “Attack Complexity (AC)” rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard users on the host server.



HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-59 Improper Link Resolution Before File Access ('Link Following')

Product status

Default status
unaffected

Any version before 23.0.9
affected

Credits

Nicholas Zubrisky (@NZubrisky) 0x400867f430

Michael DePlante(@izobashi) of Trend Micro's ZDI 0x400867f440

References

https://www.papercut.com/kb/Main/Security-Bulletin-May-2024/

cve.org CVE-2024-3037

nvd.nist.gov CVE-2024-3037

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.