<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Posts on Hey, it&#39;s Asim</title>
    <link>https://heyitsas.im/posts/</link>
    <description>Recent content in Posts on Hey, it&#39;s Asim</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <copyright>© 2026 Asim Viladi Oglu Manizada</copyright>
    <lastBuildDate>Sun, 05 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://heyitsas.im/posts/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Spooler Alert: Remote Unauth&#39;d RCE-to-root Chain in CUPS</title>
      <link>https://heyitsas.im/posts/cups/</link>
      <pubDate>Sun, 05 Apr 2026 00:00:00 +0000</pubDate>
      
      <guid>https://heyitsas.im/posts/cups/</guid>
      <description>&lt;p&gt;&lt;em&gt;TLDR: my self-orchestrating team of &lt;a href=&#34;https://www.linkedin.com/posts/yasamal4ik_february-2026-cve-2026-26080-and-cve-2026-activity-7441018899502043136-Rukx&#34;  target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;vulnerability hunting agents&lt;/a&gt; discovered two issues in CUPS, &lt;a href=&#34;https://github.com/OpenPrinting/cups/security/advisories/GHSA-4852-v58g-6cwf&#34;  target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;CVE-2026-34980&lt;/a&gt; and &lt;a href=&#34;https://github.com/OpenPrinting/cups/security/advisories/GHSA-c54j-2vqw-wpwp&#34;  target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;CVE-2026-34990&lt;/a&gt;, chainable into &lt;code&gt;unauthenticated remote attacker -&amp;gt; unprivileged RCE -&amp;gt; root file (over)write&lt;/code&gt;. See below for the prerequisites, details, and mitigation options.&lt;/em&gt;&lt;/p&gt;&#xA;&#xA;&lt;nav id=&#34;TableOfContents&#34;&gt;&#xA;  &lt;ul&gt;&#xA;    &lt;li&gt;&lt;a href=&#34;#intro&#34;&gt;Intro&lt;/a&gt;&lt;/li&gt;&#xA;    &lt;li&gt;&lt;a href=&#34;#findings&#34;&gt;Findings&lt;/a&gt;&#xA;      &lt;ul&gt;&#xA;        &lt;li&gt;&lt;a href=&#34;#are-you-affected--mitigation&#34;&gt;Are you affected? + Mitigation&lt;/a&gt;&lt;/li&gt;&#xA;      &lt;/ul&gt;&#xA;    &lt;/li&gt;&#xA;    &lt;li&gt;&lt;a href=&#34;#technical-details&#34;&gt;Technical details&lt;/a&gt;&#xA;      &lt;ul&gt;&#xA;        &lt;li&gt;&lt;a href=&#34;#cve-2026-34980-turning-a-print-option-into-scheduler-control-data&#34;&gt;CVE-2026-34980: turning a print option into scheduler control data&lt;/a&gt;&lt;/li&gt;&#xA;        &lt;li&gt;&lt;a href=&#34;#cve-2026-34990-from-lp-to-root-via-localhost-admin-auth-and-file&#34;&gt;CVE-2026-34990: from &lt;code&gt;lp&lt;/code&gt; to root via localhost admin auth and &lt;code&gt;file:///&lt;/code&gt;&lt;/a&gt;&lt;/li&gt;&#xA;      &lt;/ul&gt;&#xA;    &lt;/li&gt;&#xA;    &lt;li&gt;&lt;a href=&#34;#postscript&#34;&gt;PostScript&lt;/a&gt;&lt;/li&gt;&#xA;  &lt;/ul&gt;&#xA;&lt;/nav&gt;&#xA;&#xA;&#xA;&lt;h2 class=&#34;relative group&#34;&gt;Intro&#xA;    &lt;div id=&#34;intro&#34; class=&#34;anchor&#34;&gt;&lt;/div&gt;&#xA;    &#xA;    &lt;span&#xA;        class=&#34;absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none&#34;&gt;&#xA;        &lt;a class=&#34;text-primary-300 dark:text-neutral-700 !no-underline&#34; href=&#34;#intro&#34; aria-label=&#34;Anchor&#34;&gt;#&lt;/a&gt;&#xA;    &lt;/span&gt;&#xA;    &#xA;&lt;/h2&gt;&#xA;&lt;p&gt;CUPS is &lt;em&gt;the&lt;/em&gt; standard way to do printing on Linux and other Unix(-like) systems. It&amp;rsquo;s been on my mind as a research target ever since doing incident response to Simone Margaritelli&amp;rsquo;s 2024 &lt;a href=&#34;https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/&#34;  target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;unauth&amp;rsquo;d RCE finding&lt;/a&gt;, where he chained several CUPS vulnerabilities into an unauth&amp;rsquo;d RCE as &lt;code&gt;lp&lt;/code&gt;, the default CUPS service user.&lt;/p&gt;</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://heyitsas.im/posts/cups/featured.jpg" />
    </item>
    
  </channel>
</rss>
