CVE-2023-2508 (GCVE-0-2023-2508)

Vulnerability from cvelistv5 – Published: 2023-09-20 15:05 – Updated: 2024-09-24 15:20
VLAI?
Summary
The `PaperCutNG Mobility Print` version 1.0.3512 application allows an unauthenticated attacker to perform a CSRF attack on an instance administrator to configure the clients host (in the "configure printer discovery" section). This is possible because the application has no protections against CSRF attacks, like Anti-CSRF tokens, header origin validation, samesite cookies, etc.
CWE
  • CWE-352 - Cross-Site Request Forgery (CSRF)
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:26:08.899Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://fluidattacks.com/advisories/solveig/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.papercut.com/help/manuals/mobility-print/release-history/#mobility-print-server"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-2508",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-24T15:20:15.915578Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-24T15:20:41.975Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Mobility Print",
          "vendor": "PaperCut MF/NG",
          "versions": [
            {
              "status": "affected",
              "version": " 1.0.3512"
            }
          ]
        }
      ],
      "datePublic": "2023-09-20T15:05:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003e\u003cdiv\u003eThe `PaperCutNG Mobility Print` version 1.0.3512 application allows an\u003c/div\u003e\u003cdiv\u003eunauthenticated attacker to perform a CSRF attack on an instance\u003c/div\u003e\u003cdiv\u003eadministrator to configure the clients host (in the \"configure printer\u003c/div\u003e\u003cdiv\u003ediscovery\" section). This is possible because the application has no\u003c/div\u003e\u003cdiv\u003eprotections against CSRF attacks, like Anti-CSRF tokens, header origin\u003c/div\u003e\u003cdiv\u003evalidation, samesite cookies, etc.\u003c/div\u003e\u003c/div\u003e"
            }
          ],
          "value": "The `PaperCutNG Mobility Print` version 1.0.3512 application allows an\n\nunauthenticated attacker to perform a CSRF attack on an instance\n\nadministrator to configure the clients host (in the \"configure printer\n\ndiscovery\" section). This is possible because the application has no\n\nprotections against CSRF attacks, like Anti-CSRF tokens, header origin\n\nvalidation, samesite cookies, etc.\n\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-98",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-98 Phishing"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-352",
              "description": "CWE-352 Cross-Site Request Forgery (CSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-20T15:05:35.512Z",
        "orgId": "84fe0718-d6bb-4716-a7e8-81a6d1daa869",
        "shortName": "Fluid Attacks"
      },
      "references": [
        {
          "url": "https://fluidattacks.com/advisories/solveig/"
        },
        {
          "url": "https://www.papercut.com/help/manuals/mobility-print/release-history/#mobility-print-server"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "CSRF in PaperCutNG Mobility Print leads to sophisticated phishing",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "84fe0718-d6bb-4716-a7e8-81a6d1daa869",
    "assignerShortName": "Fluid Attacks",
    "cveId": "CVE-2023-2508",
    "datePublished": "2023-09-20T15:05:35.512Z",
    "dateReserved": "2023-05-03T22:24:15.839Z",
    "dateUpdated": "2024-09-24T15:20:41.975Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:papercut:mobility_print_server:1.0.3512:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD3748D7-5718-4CF3-BB0D-B76499F4DDEA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"387021A0-AF36-463C-A605-32EA7DAC172E\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The `PaperCutNG Mobility Print` version 1.0.3512 application allows an\\n\\nunauthenticated attacker to perform a CSRF attack on an instance\\n\\nadministrator to configure the clients host (in the \\\"configure printer\\n\\ndiscovery\\\" section). This is possible because the application has no\\n\\nprotections against CSRF attacks, like Anti-CSRF tokens, header origin\\n\\nvalidation, samesite cookies, etc.\\n\\n\\n\\n\"}, {\"lang\": \"es\", \"value\": \"La aplicaci\\u00f3n `PaperCutNG Mobility Print` versi\\u00f3n 1.0.3512 permite que un atacante no autenticado realice un ataque CSRF en un administrador de instancia para configurar el anfitri\\u00f3n del cliente (en la secci\\u00f3n \\\"configurar descubrimiento de impresora\\\"). Esto es posible porque la aplicaci\\u00f3n no tiene protecciones contra ataques CSRF, como tokens Anti-CSRF, validaci\\u00f3n del origen del encabezado, cookies del mismo sitio, etc.\"}]",
      "id": "CVE-2023-2508",
      "lastModified": "2024-11-21T07:58:44.700",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"help@fluidattacks.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}]}",
      "published": "2023-09-20T16:15:12.373",
      "references": "[{\"url\": \"https://fluidattacks.com/advisories/solveig/\", \"source\": \"help@fluidattacks.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.papercut.com/help/manuals/mobility-print/release-history/#mobility-print-server\", \"source\": \"help@fluidattacks.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://fluidattacks.com/advisories/solveig/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.papercut.com/help/manuals/mobility-print/release-history/#mobility-print-server\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}]",
      "sourceIdentifier": "help@fluidattacks.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"help@fluidattacks.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-352\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-352\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-2508\",\"sourceIdentifier\":\"help@fluidattacks.com\",\"published\":\"2023-09-20T16:15:12.373\",\"lastModified\":\"2024-11-21T07:58:44.700\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The `PaperCutNG Mobility Print` version 1.0.3512 application allows an\\n\\nunauthenticated attacker to perform a CSRF attack on an instance\\n\\nadministrator to configure the clients host (in the \\\"configure printer\\n\\ndiscovery\\\" section). This is possible because the application has no\\n\\nprotections against CSRF attacks, like Anti-CSRF tokens, header origin\\n\\nvalidation, samesite cookies, etc.\\n\\n\\n\\n\"},{\"lang\":\"es\",\"value\":\"La aplicaci\u00f3n `PaperCutNG Mobility Print` versi\u00f3n 1.0.3512 permite que un atacante no autenticado realice un ataque CSRF en un administrador de instancia para configurar el anfitri\u00f3n del cliente (en la secci\u00f3n \\\"configurar descubrimiento de impresora\\\"). Esto es posible porque la aplicaci\u00f3n no tiene protecciones contra ataques CSRF, como tokens Anti-CSRF, validaci\u00f3n del origen del encabezado, cookies del mismo sitio, etc.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"help@fluidattacks.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"help@fluidattacks.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:papercut:mobility_print_server:1.0.3512:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3748D7-5718-4CF3-BB0D-B76499F4DDEA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"387021A0-AF36-463C-A605-32EA7DAC172E\"}]}]}],\"references\":[{\"url\":\"https://fluidattacks.com/advisories/solveig/\",\"source\":\"help@fluidattacks.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.papercut.com/help/manuals/mobility-print/release-history/#mobility-print-server\",\"source\":\"help@fluidattacks.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://fluidattacks.com/advisories/solveig/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.papercut.com/help/manuals/mobility-print/release-history/#mobility-print-server\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]}]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"affected\": [{\"defaultStatus\": \"unaffected\", \"product\": \"Mobility Print\", \"vendor\": \"PaperCut MF/NG\", \"versions\": [{\"status\": \"affected\", \"version\": \" 1.0.3512\"}]}], \"datePublic\": \"2023-09-20T15:05:00.000Z\", \"descriptions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"\u003cdiv\u003e\u003cdiv\u003eThe `PaperCutNG Mobility Print` version 1.0.3512 application allows an\u003c/div\u003e\u003cdiv\u003eunauthenticated attacker to perform a CSRF attack on an instance\u003c/div\u003e\u003cdiv\u003eadministrator to configure the clients host (in the \\\"configure printer\u003c/div\u003e\u003cdiv\u003ediscovery\\\" section). This is possible because the application has no\u003c/div\u003e\u003cdiv\u003eprotections against CSRF attacks, like Anti-CSRF tokens, header origin\u003c/div\u003e\u003cdiv\u003evalidation, samesite cookies, etc.\u003c/div\u003e\u003c/div\u003e\"}], \"value\": \"The `PaperCutNG Mobility Print` version 1.0.3512 application allows an\\n\\nunauthenticated attacker to perform a CSRF attack on an instance\\n\\nadministrator to configure the clients host (in the \\\"configure printer\\n\\ndiscovery\\\" section). This is possible because the application has no\\n\\nprotections against CSRF attacks, like Anti-CSRF tokens, header origin\\n\\nvalidation, samesite cookies, etc.\\n\\n\\n\\n\"}], \"impacts\": [{\"capecId\": \"CAPEC-98\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-98 Phishing\"}]}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"NONE\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"REQUIRED\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"version\": \"3.1\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-352\", \"description\": \"CWE-352 Cross-Site Request Forgery (CSRF)\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"orgId\": \"84fe0718-d6bb-4716-a7e8-81a6d1daa869\", \"shortName\": \"Fluid Attacks\", \"dateUpdated\": \"2023-09-20T15:05:35.512Z\"}, \"references\": [{\"url\": \"https://fluidattacks.com/advisories/solveig/\"}, {\"url\": \"https://www.papercut.com/help/manuals/mobility-print/release-history/#mobility-print-server\"}], \"source\": {\"discovery\": \"EXTERNAL\"}, \"title\": \"CSRF in PaperCutNG Mobility Print leads to sophisticated phishing\", \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T06:26:08.899Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://fluidattacks.com/advisories/solveig/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.papercut.com/help/manuals/mobility-print/release-history/#mobility-print-server\", \"tags\": [\"x_transferred\"]}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-2508\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-24T15:20:15.915578Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-24T15:20:35.570Z\"}}]}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-2508\", \"assignerOrgId\": \"84fe0718-d6bb-4716-a7e8-81a6d1daa869\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"Fluid Attacks\", \"dateReserved\": \"2023-05-03T22:24:15.839Z\", \"datePublished\": \"2023-09-20T15:05:35.512Z\", \"dateUpdated\": \"2024-09-24T15:20:41.975Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…