Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
jenkins-metasploit committed Nov 22, 2024
1 parent 502e415 commit d5b71aa
Showing 1 changed file with 65 additions and 0 deletions.
65 changes: 65 additions & 0 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -118292,6 +118292,71 @@
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/misc/cups_ipp_remote_code_execution": {
"name": "CUPS IPP Attributes LAN Remote Code Execution",
"fullname": "exploit/multi/misc/cups_ipp_remote_code_execution",
"aliases": [

],
"rank": 300,
"disclosure_date": "2024-09-26",
"type": "exploit",
"author": [
"Simone Margaritelli",
"Rick de Jager",
"David Batley",
"Spencer McIntyre",
"RageLtMan <rageltman@sempervictus>",
"Ryan Emmons"
],
"description": "This module exploits vulnerabilities in OpenPrinting CUPS, which is running by\n default on most Linux distributions. The vulnerabilities allow an attacker on\n the LAN to advertise a malicious printer that triggers remote code execution\n when a victim sends a print job to the malicious printer. Successful exploitation\n requires user interaction, but no CUPS services need to be reachable via accessible\n ports. Code execution occurs in the context of the lp user. Affected versions\n are cups-browsed <= 2.0.1, libcupsfilters <= 2.1b1, libppd <= 2.1b1, and\n cups-filters <= 2.0.1.",
"references": [
"CVE-2024-47076",
"CVE-2024-47175",
"CVE-2024-47177",
"CVE-2024-47176",
"URL-https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/",
"URL-https://github.com/RickdeJager/cupshax",
"URL-https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8",
"URL-https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5",
"URL-https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6",
"URL-https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47",
"URL-https://github.com/h2g2bob/ipp-server/"
],
"platform": "Linux,Unix",
"arch": "cmd",
"rport": null,
"autofilter_ports": [

],
"autofilter_services": [

],
"targets": [
"Default"
],
"mod_time": "2024-11-21 15:14:46 +0000",
"path": "/modules/exploits/multi/misc/cups_ipp_remote_code_execution.rb",
"is_install_path": true,
"ref_name": "multi/misc/cups_ipp_remote_code_execution",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
"Stability": [
"crash-safe"
],
"Reliability": [
"event-dependent"
],
"SideEffects": [
"ioc-in-logs",
"artifacts-on-disk"
]
},
"session_types": false,
"needs_cleanup": null
},
"exploit_multi/misc/erlang_cookie_rce": {
"name": "Erlang Port Mapper Daemon Cookie RCE",
"fullname": "exploit/multi/misc/erlang_cookie_rce",
Expand Down

0 comments on commit d5b71aa

Please sign in to comment.