CVE-2024-47176

MEDIUM EXPLOITED NUCLEI

CUPS - SSRF

Title source: llm

Description

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

Exploits (18)

nomisec SCANNER 66 stars
by MalwareTech · infoleak
https://github.com/MalwareTech/CVE-2024-47176-Scanner
nomisec WORKING POC 17 stars
by l0n3m4n · client-side
https://github.com/l0n3m4n/CVE-2024-47176
nomisec SCANNER 9 stars
by mr-r3b00t · poc
https://github.com/mr-r3b00t/CVE-2024-47176
nomisec SCANNER 7 stars
by lkarlslund · poc
https://github.com/lkarlslund/jugular
nomisec SCANNER 7 stars
by GO0dspeed · poc
https://github.com/GO0dspeed/spill
nomisec SCANNER 2 stars
by aytackalinci · infoleak
https://github.com/aytackalinci/CVE-2024-47176
nomisec SCANNER 1 stars
by gianlu111 · infoleak
https://github.com/gianlu111/CUPS-CVE-2024-47176
nomisec SUSPICIOUS
by deancooreman · poc
https://github.com/deancooreman/CVE-2024-47176
gitlab SCANNER
by CSharpner · poc
https://gitlab.com/CSharpner/cups-cve-2024-47176-mitigation
nomisec SCANNER
by 0x7556 · poc
https://github.com/0x7556/CVE-2024-47176
nomisec WORKING POC
by gumerzzzindo · client-side
https://github.com/gumerzzzindo/CVE-2024-47176
nomisec SCANNER
by nma-io · poc
https://github.com/nma-io/CVE-2024-47176
nomisec SCANNER
by tonyarris · poc
https://github.com/tonyarris/CVE-2024-47176-Scanner
nomisec WORKING POC
by workabhiwin09 · poc
https://github.com/workabhiwin09/CVE-2024-47176
vulncheck_xdb WORKING POC
client-side
https://github.com/RickdeJager/cupshax
metasploit SCANNER
by evilsocket, bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/misc/cups_browsed_info_disclosure.rb
metasploit WORKING POC NORMAL
by Simone Margaritelli, Rick de Jager, s ipp-server, , # mDNS functionality, , · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/cups_ipp_remote_code_execution.rb

Nuclei Templates (1)

CUPS - Remote Code Execution
HIGHVERIFIEDby princechaddha
Shodan: product:cups

Scores

CVSS v3 5.3
EPSS 0.8704
EPSS Percentile 99.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Details

VulnCheck KEV 2024-09-27
CWE
CWE-1327
Status published
Products (1)
openprinting/cups-browsed 2.0.1
Published Sep 26, 2024
Tracked Since Feb 18, 2026