{"api_version":"1","generated_at":"2026-04-23T02:37:13+00:00","cve":"CVE-2023-24805","urls":{"html":"https://cve.report/CVE-2023-24805","api":"https://cve.report/api/cve/CVE-2023-24805.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-24805","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-24805"},"summary":{"title":"CVE-2023-24805","description":"cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-05-17 18:15:00","updated_at":"2024-01-05 16:15:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://github.com/OpenPrinting/cups-filters/commit/8f274035756c04efeb77eb654e9d4c4447287d65","name":"https://github.com/OpenPrinting/cups-filters/commit/8f274035756c04efeb77eb654e9d4c4447287d65","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-gpxc-v2m8-fr3x · OpenPrinting/cups-filters@8f27403 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x","name":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x","refsource":"MISC","tags":[],"title":"report a command inject Vulnerabilities in cups-filters · Advisory · OpenPrinting/cups-filters · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202401-06","name":"https://security.gentoo.org/glsa/202401-06","refsource":"","tags":[],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00021.html","name":"https://lists.debian.org/debian-lts-announce/2023/05/msg00021.html","refsource":"MISC","tags":[],"title":"[SECURITY] [DLA 3430-1] cups-filters security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KL2SJMZQ5T5JIH3PMQ2CGCY5TUUE255Y/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KL2SJMZQ5T5JIH3PMQ2CGCY5TUUE255Y/","refsource":"MISC","tags":[],"title":"[SECURITY] Fedora 37 Update: cups-filters-1.28.16-3.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5407","name":"https://www.debian.org/security/2023/dsa-5407","refsource":"MISC","tags":[],"title":"Debian -- Security Information -- DSA-5407-1 cups-filters","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNCGL2ZTAS2GFF23QFT55UFWIDMI4ZJK/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNCGL2ZTAS2GFF23QFT55UFWIDMI4ZJK/","refsource":"MISC","tags":[],"title":"[SECURITY] Fedora 38 Update: cups-filters-2.0~rc1-2.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-24805","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24805","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"24805","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"24805","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"24805","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"37","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"24805","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"38","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"24805","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linuxfoundation","cpe5":"cups-filters","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"24805","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linuxfoundation","cpe5":"cups-filters","cpe6":"2.0","cpe7":"beta1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"24805","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linuxfoundation","cpe5":"cups-filters","cpe6":"2.0","cpe7":"beta2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"24805","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linuxfoundation","cpe5":"cups-filters","cpe6":"2.0","cpe7":"beta3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"24805","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linuxfoundation","cpe5":"cups-filters","cpe6":"2.0","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-24805","qid":"160715","title":"Oracle Enterprise Linux Security Update for cups-filters (ELSA-2023-3423)"},{"cve":"CVE-2023-24805","qid":"160717","title":"Oracle Enterprise Linux Security Update for cups-filters (ELSA-2023-3425)"},{"cve":"CVE-2023-24805","qid":"181794","title":"Debian Security Update for cups-filters (DLA 3430-1)"},{"cve":"CVE-2023-24805","qid":"181797","title":"Debian Security Update for cups-filters (DSA 5407-1)"},{"cve":"CVE-2023-24805","qid":"184052","title":"Debian Security Update for cups-filters (CVE-2023-24805)"},{"cve":"CVE-2023-24805","qid":"199347","title":"Ubuntu Security Notification for cups-filters Vulnerability (USN-6083-1)"},{"cve":"CVE-2023-24805","qid":"199542","title":"Ubuntu Security Notification for cups-filters Vulnerability (USN-6083-2)"},{"cve":"CVE-2023-24805","qid":"241570","title":"Red Hat Update for cups-filters (RHSA-2023:3423)"},{"cve":"CVE-2023-24805","qid":"241578","title":"Red Hat Update for cups-filters (RHSA-2023:3427)"},{"cve":"CVE-2023-24805","qid":"241579","title":"Red Hat Update for cups-filters (RHSA-2023:3424)"},{"cve":"CVE-2023-24805","qid":"241584","title":"Red Hat Update for cups-filters (RHSA-2023:3425)"},{"cve":"CVE-2023-24805","qid":"241587","title":"Red Hat Update for cups-filters (RHSA-2023:3426)"},{"cve":"CVE-2023-24805","qid":"241601","title":"Red Hat Update for cups-filters (RHSA-2023:3429)"},{"cve":"CVE-2023-24805","qid":"241667","title":"Red Hat Update for cups-filters (RHSA-2023:3428)"},{"cve":"CVE-2023-24805","qid":"283994","title":"Fedora Security Update for cups (FEDORA-2023-31cf6a7a1e)"},{"cve":"CVE-2023-24805","qid":"284132","title":"Fedora Security Update for cups (FEDORA-2023-6ca587ac4c)"},{"cve":"CVE-2023-24805","qid":"355471","title":"Amazon Linux Security Advisory for cups-filters : ALAS2023-2023-223"},{"cve":"CVE-2023-24805","qid":"378594","title":"Alibaba Cloud Linux Security Update for cups-filters (ALINUX3-SA-2023:0051)"},{"cve":"CVE-2023-24805","qid":"503154","title":"Alpine Linux Security Update for cups-filters"},{"cve":"CVE-2023-24805","qid":"505997","title":"Alpine Linux Security Update for cups-filters"},{"cve":"CVE-2023-24805","qid":"673356","title":"EulerOS Security Update for cups-filters (EulerOS-SA-2023-3120)"},{"cve":"CVE-2023-24805","qid":"710823","title":"Gentoo Linux CUPS filters Remote Code Execution Vulnerability (GLSA 202401-06)"},{"cve":"CVE-2023-24805","qid":"754025","title":"SUSE Enterprise Linux Security Update for cups-filters (SUSE-SU-2023:2233-1)"},{"cve":"CVE-2023-24805","qid":"754040","title":"SUSE Enterprise Linux Security Update for cups-filters, poppler, texlive (SUSE-SU-2023:2287-1)"},{"cve":"CVE-2023-24805","qid":"941130","title":"AlmaLinux Security Update for cups-filters (ALSA-2023:3425)"},{"cve":"CVE-2023-24805","qid":"941133","title":"AlmaLinux Security Update for cups-filters (ALSA-2023:3423)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-24805","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"OpenPrinting","product":{"product_data":[{"product_name":"cups-filters","version":{"version_data":[{"version_affected":"=","version_value":"<= 2.0rc1 "}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x","refsource":"MISC","name":"https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x"},{"url":"https://github.com/OpenPrinting/cups-filters/commit/8f274035756c04efeb77eb654e9d4c4447287d65","refsource":"MISC","name":"https://github.com/OpenPrinting/cups-filters/commit/8f274035756c04efeb77eb654e9d4c4447287d65"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNCGL2ZTAS2GFF23QFT55UFWIDMI4ZJK/","refsource":"MISC","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNCGL2ZTAS2GFF23QFT55UFWIDMI4ZJK/"},{"url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00021.html","refsource":"MISC","name":"https://lists.debian.org/debian-lts-announce/2023/05/msg00021.html"},{"url":"https://www.debian.org/security/2023/dsa-5407","refsource":"MISC","name":"https://www.debian.org/security/2023/dsa-5407"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KL2SJMZQ5T5JIH3PMQ2CGCY5TUUE255Y/","refsource":"MISC","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KL2SJMZQ5T5JIH3PMQ2CGCY5TUUE255Y/"}]},"source":{"advisory":"GHSA-gpxc-v2m8-fr3x","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-05-17 18:15:00","lastModifiedDate":"2024-01-05 16:15:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linuxfoundation:cups-filters:2.0:beta2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linuxfoundation:cups-filters:2.0:beta3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linuxfoundation:cups-filters:2.0:rc1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linuxfoundation:cups-filters:2.0:beta1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}