2023-08-04 18:00:38 +00:00
{
"id" : "CVE-2023-39143" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2023-08-04T17:15:11.510" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:14:47.763" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-08-04 18:00:38 +00:00
"descriptions" : [
{
"lang" : "en" ,
2023-08-07 20:00:39 +00:00
"value" : "PaperCut NG and PaperCut MF before 22.1.3 on Windows allow path traversal, enabling attackers to upload, read, or delete arbitrary files. This leads to remote code execution when external device integration is enabled (a very common configuration)."
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "PaperCut NG y PaperCut MF antes de 22.1.3 en Windows permiten atravesar rutas, lo que permite a los atacantes cargar, leer o eliminar archivos arbitrarios. Esto conduce a la ejecuci\u00f3n remota de c\u00f3digo cuando la integraci\u00f3n de dispositivos externos est\u00e1 habilitada (una configuraci\u00f3n muy com\u00fan).\n"
2023-08-04 18:00:38 +00:00
}
] ,
2023-08-08 22:00:38 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2023-08-08 22:00:38 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-08-08 22:00:38 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-22"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "22.1.3" ,
"matchCriteriaId" : "2D1E7B69-F906-49B6-A5AE-BC95E528AB81"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "22.1.3" ,
"matchCriteriaId" : "AE9EEC66-6455-4B4E-879D-7109E6E16199"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
] ,
2023-08-04 18:00:38 +00:00
"references" : [
{
"url" : "https://www.horizon3.ai/cve-2023-39143-papercut-path-traversal-file-upload-rce-vulnerability/" ,
2023-08-08 22:00:38 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-08-04 18:00:38 +00:00
} ,
{
"url" : "https://www.papercut.com/kb/Main/securitybulletinjuly2023/" ,
2023-08-08 22:00:38 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://www.horizon3.ai/cve-2023-39143-papercut-path-traversal-file-upload-rce-vulnerability/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://www.papercut.com/kb/Main/securitybulletinjuly2023/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-08-04 18:00:38 +00:00
}
]
}