CVE-2023-27350-POC

ezgif com-video-to-gif

Description:

This tool is designed to exploit an authentication bypass vulnerability in PaperCut MF/NG versions 8.0 and above, but prior to versions 20.1.7, 21.2.11, or 22.0.9. The vulnerability allows for unauthorized access to the system and can potentially be used for malicious purposes.

Installation:

  1. git clone https://github.com/TamingSariMY/CVE-2023-27350-POC.git
  2. pip install pyfiglet

Usage:

  1. python3 vuln.py
  2. Enter the Ip Address: xx.xx.xx.xx

Shodan Dorks:

  1. http.html:"papercut"
  2. http.html:"papercut" port:9191
  3. http.title:"PaperCut Login"

POC:

POC.MOV

Reference:

https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software
https://arcticwolf.com/resources/blog/cve-2023-27350/