We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An arbitrary file creation vulnerability exists in PaperCut NG/MF that only affects Windows servers with Web Print enabled. This specific flaw exists within the image-handler process, which can incorrectly create files that don’t exist when a maliciously formed payload is provided. This can lead to local privilege escalation. Note: This CVE has been split into two (CVE-2024-4712 and CVE-2024-8405) and it’s been rescored with a "Privileges Required (PR)" rating of low, and “Attack Complexity (AC)” rating of low, reflecting the worst-case scenario where an Administrator has granted local login access to standard network users on the host server.
Reserved 2024-05-10 | Published 2024-05-14 | Updated 2024-09-26 | Assigner PaperCutCWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
Nicholas Zubrisky (@NZubrisky) of Trend Micro Research
www.papercut.com/kb/Main/Security-Bulletin-May-2024/
Support options