CUPS 漏洞列表
共找到 7 个与 CUPS 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2024-47176: CUPS - Remote Code Execution POC
CUPS is a standards-based, open-source printing system, and cups-browsed contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. cups-browsed binds to INADDR_ANY-631, causing it to trust any packet from any source, and can cause the Get-Printer-Attributes IPP request to an attacker controlled URL. Due to the service binding to *-631 ( INADDR_ANY ), multiple bugs in cups-browsed can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. -
apple-cups-exposure: Apple CUPS Sources - Exposure POC
Apple CUPS Sources was exposed. -
CVE-2024-47176: CUPS - Remote Code Execution POC
CUPS is a standards-based, open-source printing system, and cups-browsed contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. cups-browsed binds to INADDR_ANY-631, causing it to trust any packet from any source, and can cause the Get-Printer-Attributes IPP request to an attacker controlled URL. Due to the service binding to *-631 ( INADDR_ANY ), multiple bugs in cups-browsed can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. -
cups-browsed 远程代码执行漏洞(CVE-2024-47176) 无POC
CUPS是一个通用开源打印系统,主要使用IPP等协议来管理打印任务和队列由于cups-browsed 服务在处理网络打印任务时,会绑定到 UDP 端口 631上的 INADDR_ANY 地址,从而信任来自任何来源的数据包。这可能导致未经身份验证的远程攻击者通过发送特制数据包来利用此漏洞。 -
OpenPrinting CUPS-libcupsfilters 输入验证不当漏洞 可导致远程代码执行 无POC
OpenPrinting CUPS-libcupsfilters 输入验证不当漏洞 可导致远程代码执行 -
OpenPrinting CUPS-libppd 输入验证不当漏洞 可导致远程代码执行 无POC
OpenPrinting CUPS-libppd 输入验证不当漏洞 可导致远程代码执行 -
OpenPrinting CUPS-filters命令注入漏洞 无POC
OpenPrinting CUPS-filters命令注入漏洞