This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Sep 2024 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-20 | |
Metrics |
ssvc
|
Thu, 26 Sep 2024 04:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers. | This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers. |
Weaknesses | CWE-76 |
MITRE
Status: PUBLISHED
Assigner: PaperCut
Published: 2024-03-14T03:01:05.179Z
Updated: 2024-09-26T03:46:19.820Z
Reserved: 2024-02-05T04:33:58.615Z
Link: CVE-2024-1221
Vulnrichment
Updated: 2024-08-01T18:33:25.291Z
NVD
Status : Awaiting Analysis
Published: 2024-03-14T03:15:06.607
Modified: 2024-11-21T08:50:04.920
Link: CVE-2024-1221
Redhat
No data.