A walkthrough of exploiting a HackTheBox machine running PaperCut NG 22.0 behind a Squid HTTP proxy. The attack chain involves using Spose to scan through the proxy, exploiting CVE-2023-27350 (an authentication bypass vulnerability) to gain access to the PaperCut admin interface, enabling print scripting to achieve code

12m read timeFrom 0xdf.gitlab.io
Post cover image
Table of contents
Box InfoReconShell as papercutShell as root

Sort: