Metrics
Affected Vendors & Products
Mon, 12 May 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | cups-filters vulnerable to Command injection via FoomaticRIPCommandLine | cups-filters: foomatic: foomatic-rip in cups-filters allows arbitrary command execution via the FoomaticRIPCommandLine PPD parameter |
CPEs | ||
Vendors & Products |
Openprinting
Openprinting cpdb-libs |
|
Metrics |
ssvc
|
Mon, 12 May 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 12 May 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ** DISPUTED ** CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE-2024-47176, this can lead to remote command execution. This vulnerability has been disputed by a third party because `FoomaticRIPCommandLine` is functionality that is intended to execute administrator specified code. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-47076, CVE-2024-47175, CVE-2024-47176. Reason: This candidate is a duplicate of CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. Notes: All CVE users should reference CVE-2024-47076, CVE-2024-47175, and/or CVE-2024-47176 instead of this candidate. This CVE was issued to a vulnerability that is dependent on CVE-2024-47076, CVE-2024-47175, and CVE-2024-47176. According to rule 4.2.15 of the CVE CNA rules, \"CNAs MUST NOT assign a different CVE ID to a Vulnerability that is fully interdependent with another Vulnerability. The Vulnerabilities are effectively the same single Vulnerability and MUST use one CVE ID. |
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 08 May 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE-2024-47176, this can lead to remote command execution. This vulnerability has been disputed by a third party because `FoomaticRIPCommandLine` is functionality that is intended to execute administrator specified code. | ** DISPUTED ** CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE-2024-47176, this can lead to remote command execution. This vulnerability has been disputed by a third party because `FoomaticRIPCommandLine` is functionality that is intended to execute administrator specified code. |
Thu, 08 May 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE_2024-47176, this can lead to remote command execution. | CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE-2024-47176, this can lead to remote command execution. This vulnerability has been disputed by a third party because `FoomaticRIPCommandLine` is functionality that is intended to execute administrator specified code. |
References |
|
Wed, 16 Oct 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
threat_severity
|
threat_severity
|
Fri, 27 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Openprinting
Openprinting cpdb-libs |
|
CPEs | cpe:2.3:a:openprinting:cpdb-libs:*:*:*:*:*:*:*:* | |
Vendors & Products |
Openprinting
Openprinting cpdb-libs |
|
Metrics |
ssvc
|
Thu, 26 Sep 2024 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Thu, 26 Sep 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE_2024-47176, this can lead to remote command execution. | |
Title | cups-filters vulnerable to Command injection via FoomaticRIPCommandLine | |
Weaknesses | CWE-77 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: REJECTED
Assigner: GitHub_M
Published: 2024-09-26T21:56:36.661Z
Updated: 2025-05-12T21:08:50.663Z
Reserved: 2024-09-19T22:32:11.962Z
Link: CVE-2024-47177

Updated:

Status : Rejected
Published: 2024-09-26T22:15:04.740
Modified: 2025-05-12T21:15:46.387
Link: CVE-2024-47177
