Infinite payloads? The future of API Testing with dynamic fuzzing
What if we told you that our newly released API Scanner has 922 quintillion payloads for a single type of vulnerability test? A quintillion is …
A critical chained vulnerability (CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177) has been detected within the open-source printing system CUPS (present in most Linux distributions). Attackers can achieve remote code execution, potentially leading to complete control of the vulnerable system. Detectify customers can assess whether their systems are running affected versions of CUPS.
On Thursday, September 26th, security researcher evilsocket published a write-up alongside a PoC that was published on a critical severity GNU/Linux unauthenticated RCE affecting the CUPS open-source printing system.
Attackers can execute arbitrary code on a victim’s machine if the cups-browsed service is enabled by sending a malicious request to the vulnerable device (through an IPP server) on a network the victim has access to and getting the victim to run a print job from the affected device.
Detectify security researchers and engineers have released a product update that allows all Detectify Surface Monitoring customers to check whether their systems are running affected versions of CUPS. Users can visit the Overview page in the UI for a risk assessment indicator and they are advised to make sure that Surface Monitoring is active on the domains they want to verify.
The risk status of the CUPS exploit on customers’ attack surface is now highlighted on the Overview page.
The following four CVEs were assigned to CUPS vulnerabilities linked with this attack. When chained, attackers can potentially execute RCE (remote code execution):
Until patches are released, Detectify recommends the following mitigation steps for this issue:
sudo systemctl status cups-browsed
sudo systemctl stop cups-browsed
sudo systemctl disable cups-browsed
Customers can always find updates in the “What’s New at Detectify” product log. Any questions can be directed to Customer Success representatives or Support. If you’re not already a customer, click here to sign up for a demo or a free trial and immediately start scanning. Go hack yourself!
What if we told you that our newly released API Scanner has 922 quintillion payloads for a single type of vulnerability test? A quintillion is …
Application environments are more complex than ever, with APIs forming the critical connective tissue. But this proliferation has created a vast, often invisible, attack surface. …