PaperCut NG print.script.sandboxed Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PaperCut NG. Authentication is required to exploit this vulnerability.
The specific flaw exists within the management of the print.script.sandboxed setting. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20965.
CVE ID: CVE-2023-39470
CVSS Base Severity: HIGH
CVSS Base Score: 7.2
Vendor: PaperCut
Product: NG
EPSS Score: 0.28% (probability of being exploited)
EPSS Percentile: 68.26% (scored less or equal to compared to others)
EPSS Date: 2025-02-03 (when was this score calculated)