Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-47176— cups-browsed binds to `INADDR_ANY:631`, trusting any packet from any source

CVSS 5.3 · Medium EPSS 87.59% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-47176

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
cups-browsed binds to `INADDR_ANY:631`, trusting any packet from any source
Source: NVD (National Vulnerability Database)
Vulnerability Description
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1327
Source: NVD (National Vulnerability Database)
Vulnerability Title
cups 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
cups是cups开源的一个类 Unix 操作系统的组合式印刷系统。 cups存在安全漏洞,该漏洞源于cups-browsed绑定到INADDR_ANY:631,导致它信任来自任何来源的任何数据包,并可能导致向攻击者控制的 URL 发出Get-Printer-Attributes IPP 请求。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
OpenPrintingcups-browsed <= 2.0.1 -

II. Public POCs for CVE-2024-47176

#POC DescriptionSource LinkShenlong Link
1POC scanner for CVE-2024-47176https://github.com/GO0dspeed/spillPOC Details
2CUPS Browsd Check_CVE-2024-47176https://github.com/workabhiwin09/CVE-2024-47176POC Details
3Scanner for the CUPS vulnerability CVE-2024-47176https://github.com/tonyarris/CVE-2024-47176-ScannerPOC Details
4Scannerhttps://github.com/mr-r3b00t/CVE-2024-47176POC Details
5Vulnerability Scanner for CUPS: CVE-2024-47176https://github.com/aytackalinci/CVE-2024-47176POC Details
6A simple CVE-2024-47176 (cups_browsed) check tool written in go. https://github.com/nma-io/CVE-2024-47176POC Details
7Nonehttps://github.com/pearlmansara/CVE-2024-47176-CUPSPOC Details
8Unauthenticated RCE on cups-browsed (exploit and nuclei template)https://github.com/l0n3m4n/CVE-2024-47176POC Details
9Nonehttps://github.com/gumerzzzindo/CVE-2024-47176POC Details
10A simple scanner for identifying vulnerable cups-browsed instances on your networkhttps://github.com/MalwareTech/CVE-2024-47176-ScannerPOC Details
11This repository contains a scanner for detecting vulnerabilities in the cups-browsed service of CUPS (Common Unix Printing System). The vulnerability CVE-2024-47176 allows a remote attacker to exploit an insecure configuration of the daemon, potentially leading to arbitrary code execution.https://github.com/AxthonyV/CVE-2024-47176POC Details
12A Mass Scanner designed to detect the CVE-2024-47176 vulnerability across systems running the Common Unix Printing System (CUPS). https://github.com/gianlu335/CUPS-CVE-2024-47176POC Details
13A Mass Scanner designed to detect the CVE-2024-47176 vulnerability across systems running the Common Unix Printing System (CUPS). https://github.com/gianlu111/CUPS-CVE-2024-47176POC Details
14Unix CUPS打印系统 远程代码执行漏洞https://github.com/0x7556/CVE-2024-47176POC Details
15CUPS is a standards-based, open-source printing system, and cups-browsed contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. cups-browsed binds to INADDR_ANY-631, causing it to trust any packet from any source, and can cause the Get-Printer-Attributes IPP request to an attacker controlled URL. Due to the service binding to *-631 ( INADDR_ANY ), multiple bugs in cups-browsed can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2024/CVE-2024-47176.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-47176

登录查看更多情报信息。

Same Patch Batch · OpenPrinting · 2024-09-26 · 3 CVEs total

CVE-2024-470768.6 HIGHlibcupsfilters's cfGetPrinterAttributes5 does not validate IPP attributes returned from an
CVE-2024-471758.6 HIGHlibppd's ppdCreatePPDFromIPP2 function does not sanitize IPP attributes when creating the

IV. Related Vulnerabilities

V. Comments for CVE-2024-47176

No comments yet


Leave a comment