Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| OpenPrinting | cups-browsed | <= 2.0.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | POC scanner for CVE-2024-47176 | https://github.com/GO0dspeed/spill | POC Details |
| 2 | CUPS Browsd Check_CVE-2024-47176 | https://github.com/workabhiwin09/CVE-2024-47176 | POC Details |
| 3 | Scanner for the CUPS vulnerability CVE-2024-47176 | https://github.com/tonyarris/CVE-2024-47176-Scanner | POC Details |
| 4 | Scanner | https://github.com/mr-r3b00t/CVE-2024-47176 | POC Details |
| 5 | Vulnerability Scanner for CUPS: CVE-2024-47176 | https://github.com/aytackalinci/CVE-2024-47176 | POC Details |
| 6 | A simple CVE-2024-47176 (cups_browsed) check tool written in go. | https://github.com/nma-io/CVE-2024-47176 | POC Details |
| 7 | None | https://github.com/pearlmansara/CVE-2024-47176-CUPS | POC Details |
| 8 | Unauthenticated RCE on cups-browsed (exploit and nuclei template) | https://github.com/l0n3m4n/CVE-2024-47176 | POC Details |
| 9 | None | https://github.com/gumerzzzindo/CVE-2024-47176 | POC Details |
| 10 | A simple scanner for identifying vulnerable cups-browsed instances on your network | https://github.com/MalwareTech/CVE-2024-47176-Scanner | POC Details |
| 11 | This repository contains a scanner for detecting vulnerabilities in the cups-browsed service of CUPS (Common Unix Printing System). The vulnerability CVE-2024-47176 allows a remote attacker to exploit an insecure configuration of the daemon, potentially leading to arbitrary code execution. | https://github.com/AxthonyV/CVE-2024-47176 | POC Details |
| 12 | A Mass Scanner designed to detect the CVE-2024-47176 vulnerability across systems running the Common Unix Printing System (CUPS). | https://github.com/gianlu335/CUPS-CVE-2024-47176 | POC Details |
| 13 | A Mass Scanner designed to detect the CVE-2024-47176 vulnerability across systems running the Common Unix Printing System (CUPS). | https://github.com/gianlu111/CUPS-CVE-2024-47176 | POC Details |
| 14 | Unix CUPS打印系统 远程代码执行漏洞 | https://github.com/0x7556/CVE-2024-47176 | POC Details |
| 15 | CUPS is a standards-based, open-source printing system, and cups-browsed contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. cups-browsed binds to INADDR_ANY-631, causing it to trust any packet from any source, and can cause the Get-Printer-Attributes IPP request to an attacker controlled URL. Due to the service binding to *-631 ( INADDR_ANY ), multiple bugs in cups-browsed can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2024/CVE-2024-47176.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-47076 | 8.6 HIGH | libcupsfilters's cfGetPrinterAttributes5 does not validate IPP attributes returned from an |
| CVE-2024-47175 | 8.6 HIGH | libppd's ppdCreatePPDFromIPP2 function does not sanitize IPP attributes when creating the |
No comments yet