The CUPS explout is here: GitHub - RickdeJager/cupshax
The CUPS explout is here: GitHub - RickdeJager/cupshax

github.com
GitHub - RickdeJager/cupshax

cross-posted from: https://lemmy.zip/post/23601247
I hope this goes without saying but please do not run this on machines you don't own.
The good news:
- the exploit seems to require user action
The bad news:
- Device Firewalls are ineffective against this
- if someone created a malicious printer on a local network like a library they could create serious issues
- it is hard to patch without breaking printing
- it is very easy to create printers that look legit
- even if you don't hit print the cups user agent can reveal lots of information. This may be blocked at the Firewall
TLDR: you should be careful hitting print
As other articles pointed out, this is only a problem if:
Only the last one is potentially problematic for more people, and even then, the number of people using Linux is still very small. Some libraries don't allow printing or only printing via their computers.
It's good to know this flaw exists, but it doesn't seem like a particularly concerning attack vector.
This is more likely than you think. There's more computers than you realise on the average network. Many aren't updated and have vulnerabilities. If there's one malware on one machine on your network, that means a malicious actor is on your network.
Common exemples :
But again, most people aren't running Linux, and for people who are, they're likely more conscientious about connectivity and security patches.
I agree that most people aren't paying attention to every little thing, but the likelihood of someone invading your home network for a tiny payoff, especially when it requires the rare activity of printing something, is probably low-risk.