Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE: detect and mitigate cups foomatic-rip CVE-2024-47176 2024-47177 #2975

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,96 @@
# https://www.cve.org/CVERecord?id=CVE-2024-47177
# https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
# https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
#
# In Summary there are four vulnerabilities:
#
# "CUPS is a standards-based, open-source printing system, and `cups-browsed` contains
# network printing functionality including, but not limited to, auto-discovering print
# services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it
# to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP
# request to an attacker controlled URL. When combined with other vulnerabilities,
# such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute
# arbitrary commands remotely on the target machine without authentication when a
# malicious printer is printed to."
#
# The final CVE-2024-47177 is with a score CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H (9.0 Critical)
#
# Detection:
#
# - Running default Tetragon with enable process credentials for user IDs details:
# https://tetragon.io/docs/installation/configuration/#enable-process-credentials
#
# Query Tetragon JSON logs assuming they are in "/var/log/tetragon/tetragon.log":
#
# jq 'select(.process_exec != null) | select(.process_exec.parent.binary | contains("foomatic-rip"))' \
# /var/log/tetragon/tetragon.log
#
# Example output:
# {
# "process_exec": {
# "process": {
# "exec_id": "cm9yb25vYToyOTk4MDQ1MzgwOTcxNjoxMTI4OTA=",
# "pid": 112890,
# "uid": 7,
# "cwd": "/",
# "binary": "/bin/sh",
# "arguments": "-e -c \"touch /tmp/cups_exploit #\"",
# "process_credentials": {
# "uid": 7,
# "gid": 7,
# "euid": 7,
# "egid": 7,
# }
# },
# "parent": {
# "exec_id": "cm9yb25vYToyOTk4MDQ1MjMzNDEzOToxMTI4ODg=",
# "pid": 112888,
# "uid": 7,
# "cwd": "/",
# "binary": "/usr/lib/cups/filter/foomatic-rip"
# ...
#
#
# Metigation:
#
# * Disable BrowerRemoteProtocol in /etc/cups/cups-browsed.conf
Comment on lines +54 to +56
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
# Metigation:
#
# * Disable BrowerRemoteProtocol in /etc/cups/cups-browsed.conf
# Mitigation:
#
# * Disable BrowseRemoteProtocol in /etc/cups/cups-browsed.conf

# https://ubuntu.com/blog/cups-remote-code-execution-vulnerability-fix-available
#
# * Update this Tracing Policy to kill execution of commands by foomatic-rip binary, however
# foomatic-rip is part of Foomatic, a comprehensive database of printers, printer drivers,
# and driver descriptions. It is a universal print filter which is used as a CUPS filter
# to translate PostScript and PDF from standard input or a file to the printer's native
# language. The translation is done with an external renderer, usually Ghostscript gs
# tool.
#
# According to the CUPS developers:
# "...we can certainly recommend that people not use Foomatic, but there are likely hundreds
# of older printer models (before 2010) that are only supported through Foomatic."
#

apiVersion: cilium.io/v1alpha1
kind: TracingPolicy
metadata:
name: "cve-cups-2024-47176-2024-47177"
annotations:
url: "https://www.cve.org/CVERecord?id=CVE-2024-47177"
description: "Detects and Prevents exploitation of cups CVE-2024-47177"
author: "Tetragon.io Team"
spec:
kprobes:
- call: "security_bprm_check"
syscall: false
args:
- index: 0
type: "linux_binprm"
message: "Foomatic-rip print filter/RIP wrapper executing a command"
tags: [ "cve.2024-47176", "cve.2024-47177", "severity.critical" ]
selectors:
- matchBinaries:
- operator: "In"
values:
# Add your foomatic-rip paths here
- "/usr/lib/cups/filter/foomatic-rip"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi, thanks for nice polity! Maybe we can use Postfix operator and check only cups/filter/foomatic-rip ?

- "/lib/cups/filter/foomatic-rip"
#matchActions: # Uncomment this to kill all execution from foomatic-rip
#- action: Sigkill
Loading