Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
CVE: detect and mitigate cups foomatic-rip CVE-2024-47176 2024-47177
https://www.cve.org/CVERecord?id=CVE-2024-47177 GHSA-rj88-6mr5-rcw8 https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/ In Summary there are four vulnerabilities: "CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to." The commands are executed through foomatic-rip binary, to detect such executions run the following filter on tetragon JSON events: jq 'select(.process_exec != null) | \ select(.process_exec.parent.binary | contains("foomatic-rip"))' \ /var/log/tetragon/tetragon.log This policy can detect and block foomatic-rip binary from executing commands, however according to CUPS developers: "...we can certainly recommend that people not use Foomatic, but there are likely hundreds of older printer models (before 2010) that are only supported through Foomatic." Signed-off-by: Djalal Harouni <[email protected]>
- Loading branch information