IPP Attributes Sanitization Vulnerability in CUPS libcupsfilters
CVE-2024-47076
Key Information
- Vendor
- Openprinting
- Status
- Libcupsfilters
- Vendor
- CVE Published:
- 26 September 2024
Badges
Summary
CUPS is a standards-based, open-source printing system, and libcupsfilters
contains the code of the filters of the former cups-filters
package as library functions to be used for the data format conversion tasks needed in Printer Applications. The cfGetPrinterAttributes5
function in libcupsfilters
does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.
Affected Version(s)
libcupsfilters = <= 2.1b1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Refferences
CVSS V3.1
Timeline
- 🔴
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved