2023-09-22 20:00:28 +00:00

129 lines
4.0 KiB
JSON

{
"id": "CVE-2023-2508",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-20T16:15:12.373",
"lastModified": "2023-09-22T18:32:46.273",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The `PaperCutNG Mobility Print` version 1.0.3512 application allows an\n\nunauthenticated attacker to perform a CSRF attack on an instance\n\nadministrator to configure the clients host (in the \"configure printer\n\ndiscovery\" section). This is possible because the application has no\n\nprotections against CSRF attacks, like Anti-CSRF tokens, header origin\n\nvalidation, samesite cookies, etc.\n\n\n\n"
},
{
"lang": "es",
"value": "La aplicaci\u00f3n `PaperCutNG Mobility Print` versi\u00f3n 1.0.3512 permite que un atacante no autenticado realice un ataque CSRF en un administrador de instancia para configurar el anfitri\u00f3n del cliente (en la secci\u00f3n \"configurar descubrimiento de impresora\"). Esto es posible porque la aplicaci\u00f3n no tiene protecciones contra ataques CSRF, como tokens Anti-CSRF, validaci\u00f3n del origen del encabezado, cookies del mismo sitio, etc."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "help@fluidattacks.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "help@fluidattacks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:papercut:mobility_print_server:1.0.3512:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3748D7-5718-4CF3-BB0D-B76499F4DDEA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
}
]
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/solveig/",
"source": "help@fluidattacks.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.papercut.com/help/manuals/mobility-print/release-history/#mobility-print-server",
"source": "help@fluidattacks.com",
"tags": [
"Release Notes"
]
}
]
}