跳转到帖子

CUPS IPP Attributes LAN Remote Code Execution

recommended_posts

发布于
  • Members

CUPS IPP Attributes LAN Remote Code Execution

Disclosed
09/26/2024
Created
11/22/2024

Description

This module exploits vulnerabilities in OpenPrinting CUPS, which is running by default on most Linux distributions. The vulnerabilities allow an attacker on the LAN to advertise a malicious printer that triggers remote code execution when a victim sends a print job to the malicious printer. Successful exploitation requires user interaction, but no CUPS services need to be reachable via accessible ports. Code execution occurs in the context of the lp user. Affected versions are cups-browsed <= 2.0.1, libcupsfilters <= 2.1b1, libppd <= 2.1b1, and cups-filters <= 2.0.1.

Author(s)

  • Simone Margaritelli
  • Rick de Jager
  • David Batley
  • Spencer McIntyre
  • RageLtMan <rageltman@sempervictus>
  • Ryan Emmons

Platform

Linux,Unix

Architectures

cmd

Development

  • Source Code
  • History
  • 查看数 694
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…