WebClientPrint Processor 2.0.15.109 Unauthorized Proxy Modification

RedTeam Pentesting discovered that attackers can configure a proxy host and port to be used when fetching print jobs with WebClientPrint Processor (WCPP). This proxy setting may be distributed via specially crafted websites and is set without any user interaction as soon as the website is accessed. Version 2.0.15.109 is affected.
Source: WebClientPrint Processor 2.0.15.109 Unauthorized Proxy Modification

The post WebClientPrint Processor 2.0.15.109 Unauthorized Proxy Modification appeared first on MondoUnix.