关联漏洞
标题:
cups 安全漏洞
(CVE-2024-47176)
描述:cups是cups开源的一个类 Unix 操作系统的组合式印刷系统。 cups存在安全漏洞,该漏洞源于cups-browsed绑定到INADDR_ANY:631,导致它信任来自任何来源的任何数据包,并可能导致向攻击者控制的 URL 发出Get-Printer-Attributes IPP 请求。
描述
Scanner for the CUPS vulnerability CVE-2024-47176
介绍
CVE-2024-47176 Scanner
===
Evilsocket's PoC for CVE-2024-47176, trimmed and turned into a scanner. I literally opened it in vim and held down the d key.
Read his research [here](https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/). This script just sends the initial UDP packet to port 631 and triggers an http callback, signalling a vulnerable host.
Usage:
```
# clone the repo
git clone https://github.com/tonyarris/CVE-2024-47176-Scanner && cd CVE-2024-47176-Scanner/
# set up a virtualenv
python3 -m venv venv && source venv/bin/activate
# install ippserver
pip3 install ippserver
# set up an http listener, e.g. on app.interactsh.com or with Burp Collaborator
# prepare an input list of IPv4 addresses, one per line
# run
python3 scan.py your.callback-server.com input-list.txt
```
See your results on your callback server:

文件快照
[4.0K] /data/pocs/283044c086d608887e599451d4bd1653ac56e1fd
├── [108K] image.png
├── [ 885] README.md
└── [1.3K] scan.py
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。