CVE-2023-27350

CRITICAL KEV RANSOMWARE NUCLEI

Papercut MF < 20.1.7 - Improper Access Control

Title source: rule

Description

This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.

Exploits (16)

exploitdb WORKING POC
by MaanVader · pythonwebappsmultiple
https://www.exploit-db.com/exploits/51452
exploitdb WORKING POC
by MaanVader · pythonwebappsmultiple
https://www.exploit-db.com/exploits/51391
nomisec WORKING POC 57 stars
by horizon3ai · remote
https://github.com/horizon3ai/CVE-2023-27350
nomisec WORKING POC 12 stars
by imancybersecurity · infoleak
https://github.com/imancybersecurity/CVE-2023-27350-POC
nomisec WORKING POC 9 stars
by adhikara13 · remote
https://github.com/adhikara13/CVE-2023-27350
nomisec SCANNER 5 stars
by MaanVader · remote
https://github.com/MaanVader/CVE-2023-27350-POC
nomisec WORKING POC 4 stars
by monke443 · remote
https://github.com/monke443/CVE-2023-27350
nomisec SCANNER 2 stars
by ThatNotEasy · poc
https://github.com/ThatNotEasy/CVE-2023-27350
nomisec WORKING POC
by dezso-dfield · remote
https://github.com/dezso-dfield/CVE-2023-27350
nomisec WORKING POC
by Royall-Researchers · remote
https://github.com/Royall-Researchers/CVE-2023-27350
nomisec WORKING POC
by 0xB0y426 · poc
https://github.com/0xB0y426/CVE-2023-27350-PoC
nomisec NO CODE
by rasan2001 · poc
https://github.com/rasan2001/CVE-2023-27350-Ongoing-Exploitation-of-PaperCut-Remote-Code-Execution-Vulnerability
nomisec WRITEUP
by ASG-CASTLE · poc
https://github.com/ASG-CASTLE/CVE-2023-27350
nomisec SCANNER
by Jenderal92 · infoleak
https://github.com/Jenderal92/CVE-2023-27350
vulncheck_xdb WRITEUP
remote
https://github.com/BEPb/tryhackme
metasploit WORKING POC EXCELLENT
by catatonicprime · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/papercut_ng_auth_bypass.rb

Nuclei Templates (1)

PaperCut - Unauthenticated Remote Code Execution
CRITICALVERIFIEDby rootxharsh,iamnoooob,pdresearch
Shodan: http.html:"PaperCut" || http.html:"papercut" || http.html:"content=\"papercut\"" || cpe:"cpe:2.3:a:papercut:papercut_mf"
FOFA: body="papercut" || body="content=\"papercut\""

Scores

CVSS v3 9.8
EPSS 0.9426
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2023-04-21
VulnCheck KEV 2023-04-18
InTheWild.io 2023-04-21
ENISA EUVD EUVD-2023-31126
Ransomware Use Confirmed
CWE
CWE-284
Status published
Products (2)
papercut/papercut_mf 8.0 - 20.1.7
papercut/papercut_ng 8.0 - 20.1.7
Published Apr 20, 2023
KEV Added Apr 21, 2023
Tracked Since Feb 18, 2026