Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update CVE-2024-47176.yaml #10864

Merged
merged 1 commit into from
Sep 29, 2024
Merged

Update CVE-2024-47176.yaml #10864

merged 1 commit into from
Sep 29, 2024

Conversation

aringo
Copy link
Contributor

@aringo aringo commented Sep 29, 2024

Added regex extractor for user-agent of HTTP request. This should contain the cups version as well as the os-version. It's covered in the blog by evilsocket as this is how he retrieved the different kinds of potentially vulnerable devices.

Template / PR Information

  • Fixed CVE-2024-47176

Template Validation

I've validated this template locally?

  • [ X] YES
  • NO

Additional Details (leave it blank if not applicable)

Added regex extractor for user-agent of HTTP request. This should contain the cups version as well as the os-version.
Copy link
Member

@ehsandeep ehsandeep left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

[CVE-2024-47176] [javascript] [high] XX.XX.XX.XX:631 ["CUPS/2.2.10 (Linux 5.10.103-v7+; armv7l) IPP/2.0"]

@ehsandeep ehsandeep merged commit a5286b8 into projectdiscovery:main Sep 29, 2024
4 checks passed
@GeorginaReeder
Copy link

Thanks so much for your contribution @aringo !

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants