This allows attackers to use a maliciously formed API request to gain access to an API authorization level with elevated privileges. This applies to a small subset of PaperCut NG/MF API calls.
History

Thu, 26 Sep 2024 04:30:00 +0000

Type Values Removed Values Added
First Time appeared Papercut
Papercut papercut Mf
Papercut papercut Ng
Weaknesses CWE-200
CPEs cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*
cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*
Vendors & Products Papercut
Papercut papercut Mf
Papercut papercut Ng
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Sep 2024 04:00:00 +0000

Type Values Removed Values Added
Description This allows attackers to use a maliciously formed API request to gain access to an API authorization level with elevated privileges. This applies to a small subset of PaperCut NG/MF API calls. This allows attackers to use a maliciously formed API request to gain access to an API authorization level with elevated privileges. This applies to a small subset of PaperCut NG/MF API calls.
Weaknesses CWE-250

cve-icon MITRE

Status: PUBLISHED

Assigner: PaperCut

Published: 2024-03-14T03:03:18.638Z

Updated: 2024-09-26T03:50:54.624Z

Reserved: 2024-02-05T04:34:00.207Z

Link: CVE-2024-1222

cve-icon Vulnrichment

Updated: 2024-08-01T18:33:25.592Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-14T03:15:07.090

Modified: 2024-11-21T08:50:05.110

Link: CVE-2024-1222

cve-icon Redhat

No data.