## https://sploitus.com/exploit?id=SAINT:648936FBB2CAC7D3895D33C618D275A9
Added: 05/12/2023
### Background
PaperCut is print management software. It includes a web interface written in Java.
### Problem
An authentication bypass vulnerability in the `**SetupCompleted**` class allows a remote, unauthenticated attacker to execute arbitrary code in the context of SYSTEM.
### Resolution
Upgrade to PaperCut MF or NG 20.1.7, 21.2.11, or 22.0.9 or higher (build 65657 or higher).
### References
https://www.papercut.com/kb/Main/PO-1216-and-PO-1219
https://www.horizon3.ai/papercut-cve-2023-27350-deep-dive-and-indicators-of-compromise/
### Platforms
Windows