heroui logo

Suspicious Execution from Foomatic-rip or Cupsd Parent

Elastic Detection Rules

View Source
Summary
This detection rule is designed to identify potential exploitation attempts targeting multiple vulnerabilities in the CUPS (Common Unix Printing System) printing system, particularly CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177. The rule focuses on suspicious process command lines executed by child processes of 'foomatic-rip' and 'cupsd', which are components of the CUPS system. These vulnerabilities allow remote unauthenticated attackers to manipulate Internet Printing Protocol (IPP) URLs or inject crafted data through UDP packets or network spoofing techniques, which can lead to execution of arbitrary commands when a print job is submitted. It leverages various data sources to monitor for anomalies and triggers alerts when command lines exhibit signs of exploitation, such as attempts at process persistence, unauthorized command executions, or interactions with potentially malicious scripts.
Categories
  • Endpoint
  • Linux
  • Other
Data Sources
  • Process
  • Network Traffic
  • Logon Session
ATT&CK Techniques
  • T1203
Created: 2024-09-27