cve/2024/CVE-2024-47076.md
2025-09-29 16:08:36 +00:00

29 lines
1.7 KiB
Markdown

### [CVE-2024-47076](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076)
![](https://img.shields.io/static/v1?label=Product&message=libcupsfilters&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%202.1b1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brighgreen)
### Description
CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.
### POC
#### Reference
- https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
- https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
- https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
- https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
#### Github
- https://github.com/0x7556/CVE-2024-47176
- https://github.com/0xCZR1/PoC-Cups-RCE-CVE-exploit-chain
- https://github.com/Alie-N/cups-vulnerability-exploit
- https://github.com/Kuri119/EvilCups
- https://github.com/MalwareTech/CVE-2024-47176-Scanner
- https://github.com/gumerzzzindo/CVE-2024-47176
- https://github.com/l0n3m4n/CVE-2024-47176
- https://github.com/lkarlslund/jugular
- https://github.com/mutkus/CVE-2024-47076