RedTeam Pentesting discovered that attackers can configure a proxy host and port to be used when fetching print jobs with WebClientPrint Processor (WCPP). This proxy setting may be distributed via specially crafted websites and is set without any user interaction as soon as the website is accessed. Version 184.108.40.206 is affected. Source: WebClientPrint Processor 220.127.116.11 […]
The post WebClientPrint Processor 18.104.22.168 Unauthorized Proxy Modification appeared first on MondoUnix.