CUPS


Nmap discovered a CUPS server on the target port 631 The running service is CUPS 2.2

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/pelican]
└─$ curl -I -X OPTIONS http://$IP:631/
HTTP/1.1 200 OK
Connection: Keep-Alive
Content-Language: en_US
Content-Length: 0
Date: Fri, 21 Mar 2025 19:37:20 GMT
Keep-Alive: timeout=10
Accept-Encoding: gzip, deflate, identity
Allow: GET, HEAD, OPTIONS, POST, PUT
Server: CUPS/2.2 IPP/2.1
X-Frame-Options: DENY
Content-Security-Policy: frame-ancestors 'none'
 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/pelican]
└─$ curl -I http://$IP:631/        
HTTP/1.1 403 Forbidden
Connection: close
Content-Language: en_US
Content-Length: 343
Content-Type: text/html; charset=utf-8
Date: Fri, 21 Mar 2025 19:37:24 GMT
Accept-Encoding: gzip, deflate, identity
Server: CUPS/2.2 IPP/2.1
X-Frame-Options: DENY
Content-Security-Policy: frame-ancestors 'none'

Webroot 403

Appending the X-Forwarded-For header returned a different response. Code 400 but it leaked the version information; CUPS v2.2.10

Fuzzing


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/pelican]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -u http://$IP:631/FUZZ -H 'X-Forwarded-For: localhost' -ic -fc 403
________________________________________________
 :: Method           : GET
 :: URL              : http://192.168.132.98:631/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
 :: Header           : X-Forwarded-For: localhost
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
 :: Filter           : Response status: 403
________________________________________________
:: Progress: [20478/20478] :: Job [1/1] :: 177 req/sec :: Duration: [0:00:22] :: Errors: 0 ::

N/A