Subscriptions
No data.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 12 May 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | cups-filters vulnerable to Command injection via FoomaticRIPCommandLine | cups-filters: foomatic: foomatic-rip in cups-filters allows arbitrary command execution via the FoomaticRIPCommandLine PPD parameter |
| CPEs | ||
| Vendors & Products |
Openprinting
Openprinting cpdb-libs |
|
| Metrics |
ssvc
|
Mon, 12 May 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 12 May 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ** DISPUTED ** CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE-2024-47176, this can lead to remote command execution. This vulnerability has been disputed by a third party because `FoomaticRIPCommandLine` is functionality that is intended to execute administrator specified code. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-47076, CVE-2024-47175, CVE-2024-47176. Reason: This candidate is a duplicate of CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. Notes: All CVE users should reference CVE-2024-47076, CVE-2024-47175, and/or CVE-2024-47176 instead of this candidate. This CVE was issued to a vulnerability that is dependent on CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. According to rule 4.2.15 of the CVE CNA rules, \"CNAs MUST NOT assign a different CVE ID to a Vulnerability that is fully interdependent with another Vulnerability. The Vulnerabilities are effectively the same single Vulnerability and MUST use one CVE ID. |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 08 May 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE-2024-47176, this can lead to remote command execution. This vulnerability has been disputed by a third party because `FoomaticRIPCommandLine` is functionality that is intended to execute administrator specified code. | ** DISPUTED ** CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE-2024-47176, this can lead to remote command execution. This vulnerability has been disputed by a third party because `FoomaticRIPCommandLine` is functionality that is intended to execute administrator specified code. |
Thu, 08 May 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE_2024-47176, this can lead to remote command execution. | CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE-2024-47176, this can lead to remote command execution. This vulnerability has been disputed by a third party because `FoomaticRIPCommandLine` is functionality that is intended to execute administrator specified code. |
| References |
|
Wed, 16 Oct 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
threat_severity
|
threat_severity
|
Fri, 27 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openprinting
Openprinting cpdb-libs |
|
| CPEs | cpe:2.3:a:openprinting:cpdb-libs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openprinting
Openprinting cpdb-libs |
|
| Metrics |
ssvc
|
Thu, 26 Sep 2024 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 26 Sep 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE_2024-47176, this can lead to remote command execution. | |
| Title | cups-filters vulnerable to Command injection via FoomaticRIPCommandLine | |
| Weaknesses | CWE-77 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: REJECTED
Assigner: GitHub_M
Published:
Updated: 2025-05-12T21:08:50.663Z
Reserved: 2024-09-19T22:32:11.962Z
Link: CVE-2024-47177
Updated:
Status : Rejected
Published: 2024-09-26T22:15:04.740
Modified: 2025-05-12T21:15:46.387
Link: CVE-2024-47177
OpenCVE Enrichment
No data.