Lucene search

K
nessusThis script is Copyright (C) 2014-2024 and is owned by Tenable, Inc. or an Affiliate thereof.CUPS_BASH_RCE.NBIN
HistoryDec 08, 2014 - 12:00 a.m.

CUPS Remote Command Execution via Shellshock

2014-12-0800:00:00
This script is Copyright (C) 2014-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
41

The remote host appears to be running CUPS with the web-based interface enabled. A remote attacker can exploit CUPS to execute arbitrary commands via crafted fields during the creation or modification of a printer. The ‘PRINTER_INFO’ and ‘PRINTER_LOCATION’ fields can be configured to contain arbitrary commands which will be executed when a print job is submitted, provided the remote host is running a vulnerable version of Bash.

This plugin attempts to exploit this flaw by using user-supplied credentials to access the CUPS server and create a printer, then submitting a print request.

Binary data cups_bash_rce.nbin
VendorProductVersion
applecups
gnubash