CVE-2023-39470

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated remote attackers to execute arbitrary code with SYSTEM privileges on PaperCut NG servers by exploiting an exposed dangerous function in the print.script.sandboxed setting. Organizations running vulnerable PaperCut NG installations are affected.

💻 Affected Systems

Products:
  • PaperCut NG
Versions: Versions prior to 22.1.3 (for PaperCut NG)
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Authentication is required to exploit this vulnerability, but default configurations may allow exploitation by authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges, allowing attackers to install malware, steal data, pivot to other systems, or disrupt printing services.

🟠

Likely Case

Privilege escalation leading to unauthorized access to sensitive data, configuration manipulation, or installation of backdoors.

🟢

If Mitigated

Limited impact if proper network segmentation, authentication controls, and monitoring are in place to detect exploitation attempts.

🌐 Internet-Facing: HIGH if PaperCut NG is exposed to the internet, as authenticated attackers can achieve remote code execution.
🏢 Internal Only: MEDIUM to HIGH depending on internal network segmentation and authentication controls, as authenticated users could exploit it.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but is straightforward once authenticated. ZDI-CAN-20965 indicates active research.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PaperCut NG 22.1.3 or later

Vendor Advisory: https://www.papercut.com/kb/Main/SecurityBulletinJune2023/

Restart Required: Yes

Instructions:

1. Download PaperCut NG version 22.1.3 or later from the official PaperCut website. 2. Backup your current installation and configuration. 3. Run the installer to upgrade. 4. Restart the PaperCut NG service or server as required.

🔧 Temporary Workarounds

Restrict Access to PaperCut NG

all

Limit network access to PaperCut NG servers to only trusted users and networks using firewalls or network segmentation.

Enforce Strong Authentication

all

Implement multi-factor authentication (MFA) and strong password policies to reduce the risk of unauthorized authenticated access.

🧯 If You Can't Patch

  • Isolate PaperCut NG servers in a segmented network zone with strict access controls.
  • Monitor for suspicious activities, such as unauthorized access attempts or changes to print.script.sandboxed settings.

🔍 How to Verify

Check if Vulnerable:

Check the PaperCut NG version in the admin interface under 'About' or run 'java -jar papercut-ng.jar --version' on the server.

Check Version:

java -jar papercut-ng.jar --version

Verify Fix Applied:

Verify the version is 22.1.3 or later and check that the print.script.sandboxed setting is properly secured in the configuration.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Changes to print.script.sandboxed settings
  • Execution of unexpected scripts or commands

Network Indicators:

  • Unusual outbound connections from PaperCut NG servers
  • Traffic to known exploit patterns

SIEM Query:

source="papercut-ng" AND (event="authentication_failure" OR event="configuration_change" OR event="script_execution")

🔗 References

📤 Share & Export