This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.
The remote printer service is affected by a remote command execution
vulnerability via Shellshock.
The remote host appears to be running CUPS with the web-based
interface enabled. A remote attacker can exploit CUPS to execute
arbitrary commands via crafted fields during the creation or
modification of a printer. The 'PRINTER_INFO' and 'PRINTER_LOCATION'
fields can be configured to contain arbitrary commands which will be
executed when a print job is submitted, provided the remote host is
running a vulnerable version of Bash.
This plugin attempts to exploit this flaw by using user-supplied
credentials to access the CUPS server and create a printer, then
submitting a print request.
See also :
Apply the referenced Bash patch.
Risk factor :
High / CVSS Base Score : 9.0
CVSS Temporal Score : 7.8
Public Exploit Available : true