cvelist/2023/39xxx/CVE-2023-39143.json

67 lines
2.2 KiB
JSON
Raw Normal View History

2023-07-25 07:00:34 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2023-08-04 17:00:47 +00:00
"ID": "CVE-2023-39143",
"STATE": "PUBLIC"
2023-07-25 07:00:34 +00:00
},
2023-08-04 17:00:47 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2023-07-25 07:00:34 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2023-08-07 18:00:32 +00:00
"value": "PaperCut NG and PaperCut MF before 22.1.3 on Windows allow path traversal, enabling attackers to upload, read, or delete arbitrary files. This leads to remote code execution when external device integration is enabled (a very common configuration)."
2023-08-04 17:00:47 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.horizon3.ai/cve-2023-39143-papercut-path-traversal-file-upload-rce-vulnerability/",
"url": "https://www.horizon3.ai/cve-2023-39143-papercut-path-traversal-file-upload-rce-vulnerability/"
},
{
"refsource": "MISC",
"name": "https://www.papercut.com/kb/Main/securitybulletinjuly2023/",
"url": "https://www.papercut.com/kb/Main/securitybulletinjuly2023/"
2023-07-25 07:00:34 +00:00
}
]
}
}