{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-1221","assignerOrgId":"eb41dac7-0af8-4f84-9f6d-0272772514f4","state":"PUBLISHED","assignerShortName":"PaperCut","dateReserved":"2024-02-05T04:33:58.615Z","datePublished":"2024-03-14T03:01:05.179Z","dateUpdated":"2024-09-26T03:46:19.820Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","platforms":["MacOS","Linux"],"product":"PaperCut NG, PaperCut MF","vendor":"PaperCut","versions":[{"changes":[{"at":"23.0.7","status":"unaffected"}],"lessThan":"23.0.7","status":"affected","version":"0","versionType":"custom"},{"changes":[{"at":"22.1.5","status":"unaffected"}],"lessThan":"22.1.5","status":"affected","version":"0","versionType":"custom"},{"changes":[{"at":"21.2.14","status":"unaffected"}],"lessThan":"21.2.14","status":"affected","version":"0","versionType":"custom"},{"changes":[{"at":"20.1.10","status":"unaffected"}],"lessThan":"20.1.10","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: transparent;\">This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers.</span><br>"}],"value":"This vulnerability potentially allows files on a PaperCut NG/MF server to be exposed using a specifically formed payload against the impacted API endpoint. The attacker must carry out some reconnaissance to gain knowledge of a system token. This CVE only affects Linux and macOS PaperCut NG/MF servers."}],"impacts":[{"capecId":"CAPEC-131","descriptions":[{"lang":"en","value":"CAPEC-131 Resource Leak Exposure"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":3.1,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-76","description":"CWE-76 Improper Neutralization of Equivalent Special Elements","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"eb41dac7-0af8-4f84-9f6d-0272772514f4","shortName":"PaperCut","dateUpdated":"2024-09-26T03:46:19.820Z"},"references":[{"url":"https://www.papercut.com/kb/Main/Security-Bulletin-March-2024"}],"source":{"discovery":"UNKNOWN"},"title":"Improper access controls on APIs on Linux and macOS in PaperCut NG/MF","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-1221","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-03-15T15:25:34.441612Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:59:42.267Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:33:25.291Z"},"title":"CVE Program Container","references":[{"url":"https://www.papercut.com/kb/Main/Security-Bulletin-March-2024","tags":["x_transferred"]}]}]}}