POC详情: 283044c086d608887e599451d4bd1653ac56e1fd

来源
关联漏洞
标题: cups 安全漏洞 (CVE-2024-47176)
描述:cups是cups开源的一个类 Unix 操作系统的组合式印刷系统。 cups存在安全漏洞,该漏洞源于cups-browsed绑定到INADDR_ANY:631,导致它信任来自任何来源的任何数据包,并可能导致向攻击者控制的 URL 发出Get-Printer-Attributes IPP 请求。
描述
Scanner for the CUPS vulnerability CVE-2024-47176
介绍
CVE-2024-47176 Scanner
===

Evilsocket's PoC for CVE-2024-47176, trimmed and turned into a scanner. I literally opened it in vim and held down the d key.

Read his research [here](https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/). This script just sends the initial UDP packet to port 631 and triggers an http callback, signalling a vulnerable host.

Usage:
```
# clone the repo
git clone https://github.com/tonyarris/CVE-2024-47176-Scanner && cd CVE-2024-47176-Scanner/

# set up a virtualenv
python3 -m venv venv && source venv/bin/activate

# install ippserver
pip3 install ippserver

# set up an http listener, e.g. on app.interactsh.com or with Burp Collaborator

# prepare an input list of IPv4 addresses, one per line

# run
python3 scan.py your.callback-server.com input-list.txt
```
See your results on your callback server:

![results](image.png)
文件快照

[4.0K] /data/pocs/283044c086d608887e599451d4bd1653ac56e1fd ├── [108K] image.png ├── [ 885] README.md └── [1.3K] scan.py 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。