CUPS Remote Command Execution via Shellshock

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.

Synopsis :

The remote printer service is affected by a remote command execution
vulnerability via Shellshock.

Description :

The remote host appears to be running CUPS with the web-based
interface enabled. A remote attacker can exploit CUPS to execute
arbitrary commands via crafted fields during the creation or
modification of a printer. The 'PRINTER_INFO' and 'PRINTER_LOCATION'
fields can be configured to contain arbitrary commands which will be
executed when a print job is submitted, provided the remote host is
running a vulnerable version of Bash.

This plugin attempts to exploit this flaw by using user-supplied
credentials to access the CUPS server and create a printer, then
submitting a print request.

See also :

Solution :

Apply the referenced Bash patch.

Risk factor :

High / CVSS Base Score : 9.0
CVSS Temporal Score : 7.8
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 79804 ()

Bugtraq ID: 70103

CVE ID: CVE-2014-6271

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now