
Cloud Vulnerability DB
A community-led vulnerabilities database
An arbitrary file creation vulnerability exists in PaperCut NG/MF that affects Windows servers with Web Print enabled. The vulnerability was discovered in May 2024 and assigned CVE-2024-4712. The flaw specifically exists within the image-handler process of PaperCut NG/MF software (CVE Details).
The vulnerability exists within the Web Print Image Handler component where there is a lack of proper validation of user-supplied paths prior to file operations. When a maliciously formed payload is provided, the image-handler process can incorrectly create files that don't exist. The vulnerability has been assigned a CVSS score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) (ZDI Advisory).
This vulnerability can lead to local privilege escalation, allowing an attacker to execute arbitrary code in the context of SYSTEM. The attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability (ZDI Advisory).
PaperCut has issued an update to correct this vulnerability. System administrators should apply the latest security patches available from PaperCut to address this issue (ZDI Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."