Search for vulnerabilities
Vulnerability ID | VCID-vk83-kkj8-sffy |
Aliases |
CVE-2024-47076
|
Summary | CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 7.4 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
CWE-20 | Improper Input Validation |
Data source | Metasploit |
---|---|
Description | This module exploits vulnerabilities in OpenPrinting CUPS, which is running by default on most Linux distributions. The vulnerabilities allow an attacker on the LAN to advertise a malicious printer that triggers remote code execution when a victim sends a print job to the malicious printer. Successful exploitation requires user interaction, but no CUPS services need to be reachable via accessible ports. Code execution occurs in the context of the lp user. Affected versions are cups-browsed <= 2.0.1, libcupsfilters <= 2.1b1, libppd <= 2.1b1, and cups-filters <= 2.0.1. |
Note | Stability: - crash-safe Reliability: - event-dependent SideEffects: - ioc-in-logs - artifacts-on-disk |
Ransomware campaign use | Unknown |
Source publication date | Sept. 26, 2024 |
Platform | Linux,Unix |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/misc/cups_ipp_remote_code_execution.rb |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.15162 |
EPSS Score | 0.00045 |
Published At | Nov. 1, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2024-09-26T23:52:30.783555+00:00 | Ubuntu USN Importer | Import | https://usn.ubuntu.com/7043-1/ | 34.0.1 |