CVE-2024-4712
PaperCut NG vulnerability analysis and mitigation

Overview

An arbitrary file creation vulnerability exists in PaperCut NG/MF that affects Windows servers with Web Print enabled. The vulnerability was discovered in May 2024 and assigned CVE-2024-4712. The flaw specifically exists within the image-handler process of PaperCut NG/MF software (CVE Details).

Technical details

The vulnerability exists within the Web Print Image Handler component where there is a lack of proper validation of user-supplied paths prior to file operations. When a maliciously formed payload is provided, the image-handler process can incorrectly create files that don't exist. The vulnerability has been assigned a CVSS score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) (ZDI Advisory).

Impact

This vulnerability can lead to local privilege escalation, allowing an attacker to execute arbitrary code in the context of SYSTEM. The attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability (ZDI Advisory).

Mitigation and workarounds

PaperCut has issued an update to correct this vulnerability. System administrators should apply the latest security patches available from PaperCut to address this issue (ZDI Advisory).

Additional resources


SourceThis report was generated using AI

Related PaperCut NG vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-8404HIGH7.8
  • PaperCut NGPaperCut NG
  • cpe:2.3:a:papercut:papercut_mf
NoYesSep 26, 2024
CVE-2024-4712HIGH7.8
  • PaperCut NGPaperCut NG
  • cpe:2.3:a:papercut:papercut_mf
NoYesMay 14, 2024
CVE-2023-39470HIGH7.2
  • PaperCut NGPaperCut NG
  • cpe:2.3:a:papercut:papercut_ng
NoYesNov 22, 2024
CVE-2024-9672MEDIUM6.3
  • PaperCut NGPaperCut NG
  • cpe:2.3:a:papercut:papercut_mf
NoYesDec 10, 2024
CVE-2024-8405MEDIUM5.5
  • PaperCut NGPaperCut NG
  • cpe:2.3:a:papercut:papercut_mf
NoYesSep 26, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management