CVE-2023-4568
PaperCut NG vulnerability analysis and mitigation

Overview

PaperCut NG contains a vulnerability that allows unauthenticated XMLRPC commands to be executed by default. The vulnerability affects versions 22.0.12 and below, with later versions potentially affected due to the absence of a vendor-supplied patch. This vulnerability was assigned CVE-2023-4568 and was disclosed in September 2023 (Tenable Advisory).

Technical details

The vulnerability stems from insufficient access controls for XMLRPC operations in PaperCut NG. Access to XMLRPC operations is controlled by various allowed IP lists, but by default, many allowed IP lists (including auth.providers.allowed-addresses) are configured with wildcard settings. This configuration allows unauthenticated remote attackers to issue XMLRPC calls. The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N (Tenable Advisory).

Impact

The vulnerability allows unauthorized access to XMLRPC functionality, potentially enabling attackers to perform operations such as adding printers and retrieving configuration information. This could lead to unauthorized system modifications and information disclosure (Tenable Advisory).

Mitigation and workarounds

PaperCut's security team has acknowledged the behavior and potential impacts of this issue but does not plan to provide a patch. Users are advised to implement relevant mitigations as recommended by product documentation, particularly focusing on properly configuring IP address restrictions for XMLRPC access (Tenable Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management