Vulnerability Details : CVE-2023-24805
Potential exploit
cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime.
Vulnerability category: Execute code
Products affected by CVE-2023-24805
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:2.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:2.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:2.0:beta1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-24805
9.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-24805
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
GitHub, Inc. |
CWE ids for CVE-2023-24805
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by:
- nvd@nist.gov (Primary)
- security-advisories@github.com (Secondary)
References for CVE-2023-24805
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNCGL2ZTAS2GFF23QFT55UFWIDMI4ZJK/
Mailing List;Release Notes
-
https://security.gentoo.org/glsa/202401-06
CUPS filters: Remote Code Execution (GLSA 202401-06) — Gentoo security
-
https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x
report a command inject Vulnerabilities in cups-filters · Advisory · OpenPrinting/cups-filters · GitHubExploit;Vendor Advisory
-
https://github.com/OpenPrinting/cups-filters/commit/8f274035756c04efeb77eb654e9d4c4447287d65
Merge pull request from GHSA-gpxc-v2m8-fr3x · OpenPrinting/cups-filters@8f27403 · GitHubPatch
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KL2SJMZQ5T5JIH3PMQ2CGCY5TUUE255Y/
[SECURITY] Fedora 37 Update: cups-filters-1.28.16-3.fc37 - package-announce - Fedora Mailing-ListsMailing List;Release Notes
-
https://www.debian.org/security/2023/dsa-5407
Debian -- Security Information -- DSA-5407-1 cups-filtersThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/05/msg00021.html
[SECURITY] [DLA 3430-1] cups-filters security updateMailing List;Third Party Advisory
Jump to