CUPS 1.6.1 Root File Read

2013-08-25T19:30:11
ID MSF:POST/MULTI/ESCALATE/CUPS_ROOT_FILE_READ
Type metasploit
Reporter Rapid7
Modified 2020-10-02T20:00:37

Description

This module exploits a vulnerability in CUPS < 1.6.2, an open source printing system. CUPS allows members of the lpadmin group to make changes to the cupsd.conf configuration, which can specify an Error Log path. When the user visits the Error Log page in the web interface, the cupsd daemon (running with setuid root) reads the Error Log path and echoes it as plaintext. This module is known to work on Mac OS X < 10.8.4 and Ubuntu Desktop <= 12.0.4 as long as the session is in the lpadmin group. Warning: if the user has set up a custom path to the CUPS error log, this module might fail to reset that path correctly. You can specify a custom error log path with the ERROR_LOG datastore option.