This allows attackers to use a maliciously formed API request to gain access to an API authorization level with elevated privileges. This applies to a small subset of PaperCut NG/MF API calls.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Sep 2024 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Papercut
Papercut papercut Mf Papercut papercut Ng |
|
Weaknesses | CWE-200 | |
CPEs | cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:* cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Papercut
Papercut papercut Mf Papercut papercut Ng |
|
Metrics |
ssvc
|
Thu, 26 Sep 2024 04:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | This allows attackers to use a maliciously formed API request to gain access to an API authorization level with elevated privileges. This applies to a small subset of PaperCut NG/MF API calls. | This allows attackers to use a maliciously formed API request to gain access to an API authorization level with elevated privileges. This applies to a small subset of PaperCut NG/MF API calls. |
Weaknesses | CWE-250 |
MITRE
Status: PUBLISHED
Assigner: PaperCut
Published: 2024-03-14T03:03:18.638Z
Updated: 2024-09-26T03:50:54.624Z
Reserved: 2024-02-05T04:34:00.207Z
Link: CVE-2024-1222
Vulnrichment
Updated: 2024-08-01T18:33:25.592Z
NVD
Status : Awaiting Analysis
Published: 2024-03-14T03:15:07.090
Modified: 2024-11-21T08:50:05.110
Link: CVE-2024-1222
Redhat
No data.