A simple tool to scan systems running CUPS (Common Unix Printing System) for the CVE-2024-47176 vulnerability. This vulnerability can lead to remote code execution (RCE) through the Internet Printing Protocol (IPP) on port 631.
- Automated Scanning: Sends crafted UDP packets to detect vulnerable CUPS instances.
- Multi-threaded Scanning: Efficiently scans multiple IP addresses simultaneously.
- Callback Logging: Logs responses from vulnerable systems via a callback server.
- Clone the repository:
git clone https://github.com/your-username/CVE-2024-47176-scanner.git
Run the scanner with the following command:
python3 CVE-2024-47176.py <HOST_CALLBACK> <FILE_INPUT>
<HOST_CALLBACK>
: The URL or IP of your callback server.<FILE_INPUT>
: A text file containing a list of target IP addresses, one per line.
python3 CVE-2024-47176.py HOST_CALLBACK FILE_INPUT