https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/ ๐Ÿฟ

nostr:note18amd3aesnrwfl7cltfje3y9q0q2vf6r7cpz6rznf5ynv70al775slegset

Reply to this note

Please Login to reply.

Discussion

Removing cupsd on desktops has long been a part of many orgs security policy, and servers shouldn't have it installed in the first place.

Having packages installed that aren't being actively used is a big attack surface, as this exploit shows.

Ppl use Linux instead of RTOS for all kinds of things they shouldn't.

Man will use a full stack Linux distribution with a raspberry pi to turn on and off a light instead of going to therapy.

Don't you need cups installed to print? Even apple has it running

Man will use software that talks to a cloud server or a system in China, over the internet, instead of pressing a button to turn on and off a light instead of going to therapy.

Every time us-east-1 goes tits up half the US households go dark.

cupsd + some random closed firmware for printer compatibility all exposed on misconfigured avahi is the real man full stack to do bitcoin signs ๐Ÿ™