Skip to content

A Mass Scanner designed to detect the CVE-2024-47176 vulnerability across systems running the Common Unix Printing System (CUPS).

Notifications You must be signed in to change notification settings

gianlu111/CUPS-CVE-2024-47176

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2024-47176 Vulnerability Scanner for CUPS

A simple tool to scan systems running CUPS (Common Unix Printing System) for the CVE-2024-47176 vulnerability. This vulnerability can lead to remote code execution (RCE) through the Internet Printing Protocol (IPP) on port 631.

Features

  • Automated Scanning: Sends crafted UDP packets to detect vulnerable CUPS instances.
  • Multi-threaded Scanning: Efficiently scans multiple IP addresses simultaneously.
  • Callback Logging: Logs responses from vulnerable systems via a callback server.

Installation

  1. Clone the repository:
    git clone https://github.com/your-username/CVE-2024-47176-scanner.git
    
    

Usage

Run the scanner with the following command:

python3 CVE-2024-47176.py <HOST_CALLBACK> <FILE_INPUT>
  • <HOST_CALLBACK>: The URL or IP of your callback server.
  • <FILE_INPUT>: A text file containing a list of target IP addresses, one per line.

Example

python3 CVE-2024-47176.py HOST_CALLBACK FILE_INPUT

About

A Mass Scanner designed to detect the CVE-2024-47176 vulnerability across systems running the Common Unix Printing System (CUPS).

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages