CUPS Remote Command Execution via Shellshock

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.


Synopsis :

The remote printer service is affected by a remote command execution
vulnerability via Shellshock.

Description :

The remote host appears to be running CUPS with the web-based
interface enabled. A remote attacker can exploit CUPS to execute
arbitrary commands via crafted fields during the creation or
modification of a printer. The 'PRINTER_INFO' and 'PRINTER_LOCATION'
fields can be configured to contain arbitrary commands which will be
executed when a print job is submitted, provided the remote host is
running a vulnerable version of Bash.

This plugin attempts to exploit this flaw by using user-supplied
credentials to access the CUPS server and create a printer, then
submitting a print request.

See also :

http://seclists.org/oss-sec/2014/q3/650
http://www.nessus.org/u?dacf7829
https://www.invisiblethreat.ca/post/shellshock/

Solution :

Apply the referenced Bash patch.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 7.8
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 79804 ()

Bugtraq ID: 70103
70137

CVE ID: CVE-2014-6271
CVE-2014-7169

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now