This Metasploit module leverages an authentication bypass in PaperCut NG. If necessary it updates Papercut configuration options, specifically the print-and-de vice.script.enabled and print.script.sandboxed options to allow for arbitrary code execution running in the builtin RhinoJS engine. This module logs at most 2 events in the application log of papercut. Each event is tied to modification of server settings.
f4313d7696bef22bdc9abcdfd185a2f5ec910ab23fce5708d4d336c70e7796cb
PaperCut NG/MG version 22.0.4 remote code execution exploit.
1539d637da722a1ee7e83cceb9ee205cf15d43f93160ae5fe247b21150b68f96
PaperCut NG/MG version 22.0.4 suffers from an authentication bypass vulnerability.
95117b4ea6d64465f3bdf0cbe0e494cb29917bc6739c9247641bc9a4924cf832
PaperCut MF/NG proof of concept exploit that uses an authentication bypass vulnerability chained with abuse of built-in scripting functionality to execute code.
e01888c501e68b969faf6f9f0762260b9738e28e6c41609aee12cd8f6079824b