CVE-2024-47176
MEDIUM EXPLOITED NUCLEICUPS - SSRF
Title source: llmDescription
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
Exploits (18)
nomisec
SCANNER
66 stars
by MalwareTech · infoleak
https://github.com/MalwareTech/CVE-2024-47176-Scanner
metasploit
SCANNER
by evilsocket, bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/misc/cups_browsed_info_disclosure.rb
metasploit
WORKING POC
NORMAL
by Simone Margaritelli, Rick de Jager, s ipp-server, ,
# mDNS functionality, , · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/cups_ipp_remote_code_execution.rb
Nuclei Templates (1)
CUPS - Remote Code Execution
HIGHVERIFIEDby princechaddha
Shodan:
product:cups
Scores
CVSS v3
5.3
EPSS
0.8704
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Details
VulnCheck KEV
2024-09-27
CWE
CWE-1327
Status
published
Products (1)
openprinting/cups-browsed
2.0.1
Published
Sep 26, 2024
Tracked Since
Feb 18, 2026