Skip to content

Commit 546042d

Browse files
committed
New module: cups_version_scan to help with the vulnerable CUPS printer detection
1 parent 7c2479a commit 546042d

File tree

2 files changed

+45
-0
lines changed

2 files changed

+45
-0
lines changed

docs/Modules.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ OWASP Nettacker Modules can be of type **Scan** (scan for something), **Vuln** (
1212
* '**citrix_lastpatcheddate_scan**' Scan the target and try to detect Citrix Netscaler Gateway and it's last patched date
1313
* '**cms_detection_scan**' - Scan the target and try to detect the CMS (Wordpress, Drupal or Joomla) using response fingerprinting
1414
* '**confluence_version_scan**' - Scan the target and identify the Confluence version
15+
* '**cups_version_scan**' - Scan the target and identify the CUPS version (on port 631)
1516
* '**dir_scan**' - Scan the target for well-known directories
1617
* '**drupal_modules_scan**' - Scan the target for popular Drupal modules
1718
* '**drupal_theme_scan**' - Scan the target for popular Drupal themes
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
info:
2+
name: cups_version_scan
3+
author: OWASP Nettacker Team
4+
severity: 3
5+
description: fetch CUPS version from target to help identify CVE-2024-47176
6+
reference: https://thehackernews.com/2024/09/critical-linux-cups-printing-system.html
7+
profiles:
8+
- scan
9+
- http
10+
- backup
11+
- low_severity
12+
- drupal
13+
14+
payloads:
15+
- library: http
16+
steps:
17+
- method: get
18+
timeout: 3
19+
headers:
20+
User-Agent: "{user_agent}"
21+
allow_redirects: false
22+
ssl: false
23+
url:
24+
nettacker_fuzzer:
25+
input_format: "{{schema}}://{target}:{{ports}}/"
26+
prefix: ""
27+
suffix: ""
28+
interceptors:
29+
data:
30+
schema:
31+
- "http"
32+
ports:
33+
- 631
34+
response:
35+
condition_type: and
36+
conditions:
37+
status_code:
38+
regex: \d\d\d
39+
reverse: false
40+
headers:
41+
Server:
42+
regex: (CUPS\/[0-9]+\.[0-9]+)
43+
reverse: false
44+
log: "response_dependent['headers']['Server']"

0 commit comments

Comments
 (0)