Sept. 13, 2023, 8:02 p.m. | Jimi Sebree

Tenable Research Advisories www.tenable.com

PaperCut NG Unauthenticated XMLRPC Functionality

Insufficient access controls for XMLRPC operations exist in PaperCut NG. Versions 22.0.12 and earlier are confirmed vulnerable. Later versions may also be affected due to lack of a vendor-supplied patch.


Access to XMLPRC operations in PaperCut NG are controlled by various allowed IP lists. By default many allowed IP lists (i.e., auth.providers.allowed-addresses) are configured to be a wildcard, which allows an unauthenticated remote attacker to issue XMLPRC calls.


Proof of Concept


// Add a printer; …

access access controls controls default lists may operations papercut patch unauthenticated vendor vulnerable

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC