Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.152726
Category:General
Title:CUPS < 2.4.9 File Permission Vulnerability
Summary:CUPS is prone to a file permission vulnerability.
Description:Summary:
CUPS is prone to a file permission vulnerability.

Vulnerability Insight:
When starting the cupsd server with a Listen configuration item
pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the
provided argument, providing world-writable access to the target. Given that cupsd is often
running as root, this can result in the change of permission of any user or system files to be
world writable. Given the aforementioned Ubuntu AppArmor context, on such systems this
vulnerability is limited to those files modifiable by the cupsd process. In that specific case it
was found to be possible to turn the configuration of the Listen argument into full control over
the cupsd.conf and cups-files.conf configuration files. By later setting the User and Group
arguments in cups-files.conf, and printing with a printer configured by PPD with a
'FoomaticRIPCommandLine' argument, arbitrary user and group (not root) command execution could be
achieved, which can further be used on Ubuntu systems to achieve full root command execution.

Affected Software/OS:
CUPS prior to version 2.4.9.

Solution:
Update to version 2.4.9 or later.

CVSS Score:
4.3

CVSS Vector:
AV:L/AC:L/Au:M/C:C/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2024-35235
https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21
https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240
https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d
https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f
https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html
http://www.openwall.com/lists/oss-security/2024/06/11/1
http://www.openwall.com/lists/oss-security/2024/06/12/4
http://www.openwall.com/lists/oss-security/2024/06/12/5
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.