关联漏洞
标题:
cups 安全漏洞
(CVE-2024-47176)
描述:cups是cups开源的一个类 Unix 操作系统的组合式印刷系统。 cups存在安全漏洞,该漏洞源于cups-browsed绑定到INADDR_ANY:631,导致它信任来自任何来源的任何数据包,并可能导致向攻击者控制的 URL 发出Get-Printer-Attributes IPP 请求。
描述
A Mass Scanner designed to detect the CVE-2024-47176 vulnerability across systems running the Common Unix Printing System (CUPS).
介绍
# CVE-2024-47176 Vulnerability Scanner for CUPS
A simple tool to scan systems running **CUPS (Common Unix Printing System)** for the **CVE-2024-47176** vulnerability. This vulnerability can lead to remote code execution (RCE) through the **Internet Printing Protocol (IPP)** on port 631.
## Features
- **Automated Scanning**: Sends crafted UDP packets to detect vulnerable CUPS instances.
- **Multi-threaded Scanning**: Efficiently scans multiple IP addresses simultaneously.
- **Callback Logging**: Logs responses from vulnerable systems via a callback server.
## Installation
1. Clone the repository:
```bash
git clone https://github.com/your-username/CVE-2024-47176-scanner.git
## Usage
Run the scanner with the following command:
```bash
python3 CVE-2024-47176.py <HOST_CALLBACK> <FILE_INPUT>
```
- `<HOST_CALLBACK>`: The URL or IP of your callback server.
- `<FILE_INPUT>`: A text file containing a list of target IP addresses, one per line.
### Example
```bash
python3 CVE-2024-47176.py HOST_CALLBACK FILE_INPUT
```
文件快照
[4.0K] /data/pocs/ebe2683a0a7e5fd1e81008e02204802869eddf9d
├── [2.0K] CVE-2024-47176.py
└── [1.0K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。