POC详情: ebe2683a0a7e5fd1e81008e02204802869eddf9d

来源
关联漏洞
标题: cups 安全漏洞 (CVE-2024-47176)
描述:cups是cups开源的一个类 Unix 操作系统的组合式印刷系统。 cups存在安全漏洞,该漏洞源于cups-browsed绑定到INADDR_ANY:631,导致它信任来自任何来源的任何数据包,并可能导致向攻击者控制的 URL 发出Get-Printer-Attributes IPP 请求。
描述
A Mass Scanner designed to detect the CVE-2024-47176 vulnerability across systems running the Common Unix Printing System (CUPS). 
介绍


# CVE-2024-47176 Vulnerability Scanner for CUPS

A simple tool to scan systems running **CUPS (Common Unix Printing System)** for the **CVE-2024-47176** vulnerability. This vulnerability can lead to remote code execution (RCE) through the **Internet Printing Protocol (IPP)** on port 631.

## Features

- **Automated Scanning**: Sends crafted UDP packets to detect vulnerable CUPS instances.
- **Multi-threaded Scanning**: Efficiently scans multiple IP addresses simultaneously.
- **Callback Logging**: Logs responses from vulnerable systems via a callback server.

## Installation

1. Clone the repository:
   ```bash
   git clone https://github.com/your-username/CVE-2024-47176-scanner.git


## Usage

Run the scanner with the following command:

```bash
python3 CVE-2024-47176.py <HOST_CALLBACK> <FILE_INPUT>
```

- `<HOST_CALLBACK>`: The URL or IP of your callback server.
- `<FILE_INPUT>`: A text file containing a list of target IP addresses, one per line.

### Example

```bash
python3 CVE-2024-47176.py HOST_CALLBACK FILE_INPUT
```
文件快照

[4.0K] /data/pocs/ebe2683a0a7e5fd1e81008e02204802869eddf9d ├── [2.0K] CVE-2024-47176.py └── [1.0K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。