Sept. 13, 2023, 8:02 p.m. | Jimi Sebree

Tenable Research Advisories www.tenable.com

PaperCut NG Unauthenticated XMLRPC Functionality

Insufficient access controls for XMLRPC operations exist in PaperCut NG. Versions 22.0.12 and earlier are confirmed vulnerable. Later versions may also be affected due to lack of a vendor-supplied patch.


Access to XMLPRC operations in PaperCut NG are controlled by various allowed IP lists. By default many allowed IP lists (i.e., auth.providers.allowed-addresses) are configured to be a wildcard, which allows an unauthenticated remote attacker to issue XMLPRC calls.


Proof of Concept


// Add a printer; …

access access controls controls default lists may operations papercut patch unauthenticated vendor vulnerable

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC