Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-47176 PoC — cups-browsed binds to `INADDR_ANY:631`, trusting any packet from any source

Source
Associated Vulnerability
Title:cups-browsed binds to `INADDR_ANY:631`, trusting any packet from any source (CVE-2024-47176)
Description:CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
Description
Vulnerability Scanner for CUPS: CVE-2024-47176
Readme
# CVE-2024-47176
Vulnerability Scanner for CUPS: CVE-2024-47176

Mass Scanner for CUPS Vulnerability CVE-2024-47176 is a specialized tool designed to detect the presence of the CVE-2024-47176 vulnerability across multiple systems running the Common Unix Printing System (CUPS). This vulnerability, which affects CUPS by allowing remote code execution (RCE), can be exploited through the Internet Printing Protocol (IPP) on port 631. The mass scanner automates the process of sending crafted IPP requests to a list of target systems and analyzing their responses to identify vulnerable services.


Usage:

git clone https://github.com/aytackalinci/CVE-2024-47176.git

python3 CVE-2024-47176.py your.oastify.com list.txt




![1](https://github.com/user-attachments/assets/5360c229-312e-41f1-a80c-2e503d8bba9b)


![2](https://github.com/user-attachments/assets/b40d5a54-763c-487d-956f-e55147be7aa3)


Technical Analysis:
https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
File Snapshot

[4.0K] /data/pocs/fe843fe7b7bd8857c35b3e731ee385c0d3198c85 ├── [1.2K] CVE-2024-47176.py ├── [ 8] list.txt └── [ 997] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →