CVE-2024-47177
CVSS V2 None
CVSS V3 None
Description
CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE_2024-47176, this can lead to remote command execution.
Overview
- CVE ID
- CVE-2024-47177
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-09-26T21:56:36.661Z
- Last Modified Date
- 2024-09-26T22:02:36.767Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47 | x_refsource_CONFIRM |
https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8 | x_refsource_MISC |
https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5 | x_refsource_MISC |
https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6 | x_refsource_MISC |
https://www.cups.org | x_refsource_MISC |
https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-47177 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47177 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-10-06 13:45:16 | Added to TrackCVE |