heroui logo

Cupsd or Foomatic-rip Shell Execution

Elastic Detection Rules

View Source
Summary
This detection rule, authored by Elastic, targets multiple critical vulnerabilities found in the CUPS printing system, specifically CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177. It monitors for shell executions initiated by the 'foomatic-rip' parent process. The vulnerabilities allow remote, unauthenticated attackers to send specially crafted IPP requests or manipulate UDP packets, potentially leading to arbitrary command execution upon initiating print jobs. Each identified vulnerability presents pathways for exploitation that could result in the compromise of the system's underlying integrity, making it essential to detect and respond promptly to any matches. Furthermore, the rule encourages a thorough investigation focused on analyzing incoming requests related to printing, monitoring process activity, and examining network traffic to detect potential exploitation attempts. Should malicious activity be confirmed, the rule outlines a comprehensive incident response strategy to mitigate risks associated with exploitation.
Categories
  • Endpoint
  • Linux
Data Sources
  • Container
  • User Account
  • Process
  • Network Traffic
  • Cloud Service
ATT&CK Techniques
  • T1203
Created: 2024-09-27