Researchers uncover new way to exploit PaperCut vulnerability

by

in
Researchers uncover new way to exploit PaperCut vulnerability

A group of security researchers has found a way to exploit a critical flaw in PaperCut servers.

Previously, the flaw was disclosed by vulnCheck.

Now, VulnCheck has published a proof-of-concept exploit that sidesteps existing detection signatures by leveraging the fact that PaperCut NG and MF offer multiple paths to code execution.

The exploit relies on the auth program set as /usr/sbin/python3 for Linux and C:\Windows\System32\ftp for Windows.

It allows an administrative user to gain remote code execution over these two servers without detection signals.

Cybersecurity researchers have found a means to exploit this recently disclosed critical flaw.

Since then, the vulnerability has been weaponized by many threat groups, including ransomware actors.

Now Vulncheck has publisheda proof-oftentimes very effective PoC exploit that uses the ability to execute arbitrary code across multiple pathways to gain unauthorized code execution.

#shorts #techshorts #technews #tech #technology #PaperCut servers #VulnCheck #Windows commands

๐Ÿ‘‹ Feeling the vibes?

Keep the good energy going by checking out my Amazon affiliate link for some cool finds! ๐Ÿ›๏ธ

If not, consider contributing to my caffeine supply at Buy Me a Coffee โ˜•๏ธ.

Your clicks = cosmic support for more awesome content! ๐Ÿš€๐ŸŒˆ


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *