This vulnerability allows an already authenticated admin user to create a malicious payload that could be leveraged for remote code execution on the server hosting the PaperCut NG/MF application server.
The product correctly neutralizes certain special elements, but it improperly neutralizes equivalent special elements.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Papercut_mf | Papercut | * | 20.1.10 (excluding) |
Papercut_mf | Papercut | 21.0.0 (including) | 21.2.14 (excluding) |
Papercut_mf | Papercut | 22.0.0 (including) | 22.1.5 (excluding) |
Papercut_mf | Papercut | 23.0.1 (including) | 23.0.7 (excluding) |
Papercut_ng | Papercut | * | 20.1.10 (excluding) |
Papercut_ng | Papercut | 21.0.0 (including) | 21.2.14 (excluding) |
Papercut_ng | Papercut | 22.0.0 (including) | 22.1.5 (excluding) |
Papercut_ng | Papercut | 23.0.1 (including) | 23.0.7 (excluding) |