{"id":5552,"date":"2024-10-25T14:51:42","date_gmt":"2024-10-25T07:51:42","guid":{"rendered":"https:\/\/idwpress.com\/?p=5552"},"modified":"2024-10-25T14:51:42","modified_gmt":"2024-10-25T07:51:42","slug":"critical-cups-remote-code-execution-vulnerability","status":"publish","type":"post","link":"https:\/\/saidwp.com\/blog\/wawasan\/critical-cups-remote-code-execution-vulnerability\/","title":{"rendered":"Critical CUPS Remote Code Execution Vulnerability: How to Secure Your Linux Server (4 Steps)"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\" id=\"pendahuluan\">Pendahuluan<\/h3>\n\n\n\n<p>Common Unix Printing System (<a href=\"https:\/\/ubuntu.com\/blog\/cups-remote-code-execution-vulnerability-fix-available\">CUPS<\/a>) merupakan salah satu layanan krusial yang digunakan untuk mengelola cetakan di sistem operasi Unix dan Linux. <\/p>\n\n\n\n<p>CUPS membantu server dan komputer dalam mengelola pekerjaan cetak, sehingga sangat penting di berbagai lingkungan, baik perkantoran hingga penggunaan rumahan. <\/p>\n\n\n\n<p>Namun, kehadiran kerentanan eksekusi kode jarak jauh (Remote Code Execution atau RCE) dalam CUPS menjadi perhatian utama, terutama karena dampaknya yang besar terhadap sistem keamanan jaringan.<\/p>\n\n\n\n<div class=\"wp-block-rank-math-toc-block\" id=\"rank-math-toc\"><nav><ul><li class=\"\"><a href=\"#pendahuluan\">Pendahuluan<\/a><\/li><li class=\"\"><a href=\"#2-apa-itu-kerentanan-eksekusi-kode-jarak-jauh-di-cups\">2. Apa Itu Kerentanan Eksekusi Kode Jarak Jauh di CUPS?<\/a><\/li><li class=\"\"><a href=\"#3-detail-kerentanan-dan-cve-yang-terkena\">3. Detail Kerentanan yang Terkena<\/a><\/li><li class=\"\"><a href=\"#4-bagaimana-cara-kerentanan-ini-dimanfaatkan\">4. Bagaimana Cara Kerentanan Ini Dimanfaatkan?<\/a><ul><li class=\"\"><a href=\"#a-memanipulasi-file-konfigurasi-cups\">a. Memanipulasi File Konfigurasi<\/a><\/li><li class=\"\"><a href=\"#b-memanfaatkan-protokol-lama\">b. Memanfaatkan Protokol Lama<\/a><\/li><li class=\"\"><a href=\"#c-akses-melalui-port-yang-terbuka\">c. Akses Melalui Port yang Terbuka<\/a><\/li><\/ul><\/li><li class=\"\"><a href=\"#5-cara-melindungi-sistem-linux-dari-serangan-cups\">5. Cara Melindungi Sistem Linux dari Serangan<\/a><ul><li class=\"\"><a href=\"#a-perbarui-paket-cups\">a. Perbarui Paket<\/a><\/li><li class=\"\"><a href=\"#b-konfigurasi-ulang-firewall\">b. Konfigurasi Ulang Firewall<\/a><\/li><li class=\"\"><a href=\"#c-batasi-akses-jaringan-untuk-cups\">c. Batasi Akses Jaringan<\/a><\/li><li class=\"\"><a href=\"#d-gunakan-selalu-pengaturan-ssl-tls\">d. Gunakan Selalu Pengaturan SSL\/TLS<\/a><\/li><\/ul><\/li><li class=\"\"><a href=\"#6-langkah-langkah-pemulihan-setelah-terkena-eksploitasi\">6. Langkah-Langkah Pemulihan Setelah Terkena Eksploitasi<\/a><ul><li class=\"\"><a href=\"#a-matikan-layanan-cups-sementara\">a. Matikan Layanan<\/a><\/li><li class=\"\"><a href=\"#b-analisis-log-sistem\">b. Analisis Log Sistem<\/a><\/li><li class=\"\"><a href=\"#c-re-instalasi-cups\">c. Install Ulang<\/a><\/li><li class=\"\"><a href=\"#d-uji-keamanan-dengan-tools-analisis-keamanan\">d. Uji Keamanan dengan Tools Analisis Keamanan<\/a><\/li><\/ul><\/li><li class=\"\"><a href=\"#7-kesimpulan\">7. Kesimpulan<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n<p>Kerentanan ini memungkinkan penyerang untuk menyusup dan mengeksekusi kode berbahaya secara jarak jauh pada sistem yang tidak terlindungi, memberikan mereka kontrol penuh atas server. Dalam artikel ini, kita akan menguraikan dampak dari kerentanan ini, detail teknis tentang bagaimana kerentanan tersebut dapat dimanfaatkan, serta langkah-langkah mitigasi untuk melindungi sistem Anda dari serangan semacam ini.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"2-apa-itu-kerentanan-eksekusi-kode-jarak-jauh-di-cups\">2. Apa Itu Kerentanan Eksekusi Kode Jarak Jauh di CUPS?<\/h3>\n\n\n\n<p>CUPS adalah sistem cetak yang terkenal dan secara default ada pada banyak distribusi Linux, termasuk Ubuntu. Dengan adanya kerentanan ini, pihak berwenang seperti Canonical, pengembang Ubuntu, merilis peringatan dan pembaruan yang mendesak bagi pengguna. <\/p>\n\n\n\n<p>Kerentanan ini terjadi pada konfigurasi tertentu dari CUPS yang memungkinkan eksploitasi dari jarak jauh melalui jaringan.<\/p>\n\n\n\n<p>Dalam terminologi keamanan, kerentanan ini dikategorikan sebagai Eksekusi Kode Jarak Jauh (RCE), yaitu jenis serangan yang memungkinkan penyerang menjalankan perintah atau kode di sistem target tanpa izin. Ini adalah salah satu jenis kerentanan paling berbahaya karena memberikan akses penuh ke perangkat korban. <\/p>\n\n\n\n<p>Dalam kasus kerentanan ini, dapat dimanfaatkan oleh penyerang untuk mengakses data sensitif, mencuri informasi, atau mengendalikan perangkat secara penuh.<\/p>\n\n\n\n<p><a href=\"https:\/\/idwpress.com\/ssh-pengertian-dan-fungsi\/\">Baca juga:<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-idwpress wp-block-embed-idwpress\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/idwpress.com\/ssh-pengertian-dan-fungsi\/\n<\/div><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"3-detail-kerentanan-dan-cve-yang-terkena\">3. Detail Kerentanan yang Terkena<\/h3>\n\n\n\n<p>Kerentanan ini tercatat dalam beberapa Common Vulnerabilities and Exposures (CVE). Berikut adalah beberapa CVE terkait yang diketahui:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CVE-2023-xxxxx<\/strong>: [deskripsi CVE terkait], memberikan rincian tentang kelemahan pada proses parsing file konfigurasi yang memungkinkan penyerang mengeksekusi kode tanpa otorisasi.<\/li>\n\n\n\n<li><strong>CVE-2023-yyyyy<\/strong>: [deskripsi CVE terkait], menjelaskan bagaimana eksploitasi ini juga berdampak pada proses komunikasi antara server CUPS dan printer.<\/li>\n<\/ul>\n\n\n\n<p>Kerentanan-kernetanan ini memungkinkan penyerang mengubah file konfigurasi CUPS atau file deskripsi printer, mengakses resource yang dilindungi, dan mengirim perintah ke perangkat printer dari jarak jauh. <\/p>\n\n\n\n<p>Ini adalah ancaman besar karena bisa memengaruhi jaringan yang lebih luas, terutama jika CUPS berjalan di server yang melayani banyak perangkat.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"4-bagaimana-cara-kerentanan-ini-dimanfaatkan\">4. Bagaimana Cara Kerentanan Ini Dimanfaatkan?<\/h3>\n\n\n\n<p>Pada dasarnya, penyerang bisa memanfaatkan kerentanan ini melalui beberapa metode:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"a-memanipulasi-file-konfigurasi-cups\"><strong>a. Memanipulasi File Konfigurasi<\/strong><\/h4>\n\n\n\n<p>Penyerang dapat mengakses dan mengubah file konfigurasi CUPS untuk menambahkan skrip atau kode yang berbahaya. Dengan begitu, ketika server mencoba menjalankan perintah CUPS atau layanan terkait, kode tersebut akan dieksekusi, memberikan penyerang kontrol atas perangkat.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"b-memanfaatkan-protokol-lama\"><strong>b. Memanfaatkan Protokol Lama<\/strong><\/h4>\n\n\n\n<p>CUPS menggunakan beberapa protokol komunikasi untuk berinteraksi dengan printer dan perangkat lain, salah satunya adalah protokol IPP (Internet Printing Protocol). Jika protokol ini tidak dilindungi dengan baik, terutama di jaringan yang rentan, penyerang dapat mengirim permintaan dari jaringan publik dan melakukan serangan.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"c-akses-melalui-port-yang-terbuka\"><strong>c. Akses Melalui Port yang Terbuka<\/strong><\/h4>\n\n\n\n<p>Dalam beberapa kasus, port yang digunakan CUPS untuk komunikasi tidak selalu terlindungi atau terbatas pada jaringan lokal saja. Penyerang dapat mengidentifikasi port terbuka yang digunakan oleh CUPS dan mencoba melakukan brute force atau serangan jaringan lainnya untuk memperoleh akses.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"5-cara-melindungi-sistem-linux-dari-serangan-cups\">5. Cara Melindungi Sistem Linux dari Serangan<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"563\" src=\"https:\/\/s3.nevaobjects.id\/saidwp-blog\/blog\/wp-content\/uploads\/2024\/10\/27215549\/cups-2.jpg\" alt=\"CUPS\" class=\"wp-image-5558\" srcset=\"https:\/\/s3.nevaobjects.id\/saidwp-blog\/blog\/wp-content\/uploads\/2024\/10\/27215549\/cups-2.jpg 1000w, https:\/\/s3.nevaobjects.id\/saidwp-blog\/blog\/wp-content\/uploads\/2024\/10\/27215549\/cups-2-400x225.jpg 400w, https:\/\/s3.nevaobjects.id\/saidwp-blog\/blog\/wp-content\/uploads\/2024\/10\/27215549\/cups-2-768x432.jpg 768w, https:\/\/s3.nevaobjects.id\/saidwp-blog\/blog\/wp-content\/uploads\/2024\/10\/27215549\/cups-2-300x169.jpg 300w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\" id=\"a-perbarui-paket-cups\"><strong>a. Perbarui Paket<\/strong><\/h4>\n\n\n\n<p>Langkah paling mendasar adalah memastikan bahwa paket CUPS diperbarui ke versi terbaru yang sudah aman dari kerentanan ini. Berikut adalah langkah-langkahnya di Ubuntu:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo apt update<br>sudo apt upgrade cups<\/code><\/pre>\n\n\n\n<p>Dengan melakukan update, sistem akan mengunduh dan menginstal versi terbaru CUPS yang sudah diperbaiki. Pastikan Anda melakukan ini secara berkala untuk menjaga keamanan server Anda.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"b-konfigurasi-ulang-firewall\"><strong>b. Konfigurasi Ulang Firewall<\/strong><\/h4>\n\n\n\n<p>Sebagai langkah pencegahan tambahan, Anda bisa mengonfigurasi firewall untuk membatasi akses ke port yang digunakan oleh CUPS, terutama dari jaringan publik. Berikut adalah contoh konfigurasi menggunakan UFW (Uncomplicated Firewall):<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo ufw allow from 192.168.0.0\/24 to any port 631 proto tcp<\/code><\/pre>\n\n\n\n<p>Konfigurasi ini hanya mengizinkan akses ke port 631 (port default CUPS) dari jaringan lokal. Hindari membuka akses ini secara publik untuk meminimalkan risiko.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"c-batasi-akses-jaringan-untuk-cups\"><strong>c. Batasi Akses Jaringan<\/strong><\/h4>\n\n\n\n<p>Pastikan hanya perangkat dan pengguna yang diperbolehkan yang bisa mengakses layanan CUPS. Anda bisa mengatur pembatasan jaringan ini di file konfigurasi CUPS (<code>\/etc\/cups\/cupsd.conf<\/code>).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"d-gunakan-selalu-pengaturan-ssl-tls\"><strong>d. Gunakan Selalu Pengaturan SSL\/TLS<\/strong><\/h4>\n\n\n\n<p>Untuk menjaga agar semua komunikasi antara server dan perangkat printer aman, aktifkan SSL\/TLS di konfigurasi CUPS. Ini dapat mencegah penyadapan atau serangan man-in-the-middle.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"6-langkah-langkah-pemulihan-setelah-terkena-eksploitasi\">6. Langkah-Langkah Pemulihan Setelah Terkena Eksploitasi<\/h3>\n\n\n\n<p>Jika Anda merasa sistem sudah dieksploitasi melalui kerentanan ini, segera lakukan langkah-langkah berikut:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"a-matikan-layanan-cups-sementara\"><strong>a. Matikan Layanan<\/strong><\/h4>\n\n\n\n<p>Hentikan layanan CUPS untuk mencegah penyerang mendapatkan akses lebih jauh. Anda dapat menggunakan perintah berikut:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo systemctl stop cups<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"b-analisis-log-sistem\"><strong>b. Analisis Log Sistem<\/strong><\/h4>\n\n\n\n<p>Periksa log di <code>\/var\/log\/cups<\/code> dan log sistem lainnya untuk melihat adanya aktivitas mencurigakan. Periksa apakah ada konfigurasi atau file yang telah diubah oleh penyerang.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"c-re-instalasi-cups\"><strong>c. Install Ulang<\/strong><\/h4>\n\n\n\n<p>Jika ditemukan adanya eksploitasi, sebaiknya hapus dan instal ulang CUPS untuk memastikan tidak ada sisa kode berbahaya. Berikut caranya:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo apt purge cups<br>sudo apt install cups<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"d-uji-keamanan-dengan-tools-analisis-keamanan\"><strong>d. Uji Keamanan dengan Tools Analisis Keamanan<\/strong><\/h4>\n\n\n\n<p>Setelah memulihkan sistem, lakukan tes keamanan untuk memastikan kerentanan tersebut sudah tertutup. Tools seperti <code>nmap<\/code> bisa digunakan untuk memindai port terbuka dan memastikan hanya port yang aman yang digunakan.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"7-kesimpulan\">7. Kesimpulan<\/h3>\n\n\n\n<p>Kerentanan pada CUPS ini adalah pengingat betapa pentingnya untuk selalu memperbarui sistem dan perangkat lunak di server Linux. Meskipun CUPS mungkin terlihat sebagai layanan sederhana, eksploitasi yang memanfaatkan celah pada sistem ini dapat berdampak serius.<\/p>\n\n\n\n<p>Melakukan pembaruan rutin, menerapkan firewall yang kuat, dan meninjau konfigurasi sistem adalah beberapa langkah yang dapat dilakukan untuk menjaga keamanan server. Dalam menghadapi ancaman semacam ini, pemahaman teknis dan sikap proaktif sangat dibutuhkan.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"references\">References<\/h2>\n\n\n\n<p><a href=\"https:\/\/ubuntu.com\/blog\/cups-remote-code-execution-vulnerability-fix-available\n\">https:\/\/ubuntu.com\/blog\/cups-remote-code-execution-vulnerability-fix-available<br><\/a><a href=\"https:\/\/www.evilsocket.net\/2024\/09\/26\/Attacking-UNIX-systems-via-CUPS-Part-I\/\">https:\/\/www.evilsocket.net\/2024\/09\/26\/Attacking-UNIX-systems-via-CUPS-Part-I\/<\/a><br><a href=\"https:\/\/github.com\/OpenPrinting\/libcupsfilters\/security\/advisories\/GHSA-w63j-6g73-wmg5\">https:\/\/github.com\/OpenPrinting\/libcupsfilters\/security\/advisories\/GHSA-w63j-6g73-wmg5<\/a><br><a href=\"https:\/\/github.com\/OpenPrinting\/libppd\/security\/advisories\/GHSA-7xfx-47qg-grp6\">https:\/\/github.com\/OpenPrinting\/libppd\/security\/advisories\/GHSA-7xfx-47qg-grp6<br><\/a><a href=\"https:\/\/github.com\/OpenPrinting\/cups-browsed\/security\/advisories\/GHSA-rj88-6mr5-rcw8\">https:\/\/github.com\/OpenPrinting\/cups-browsed\/security\/advisories\/GHSA-rj88-6mr5-rcw8<\/a><br><a href=\"https:\/\/github.com\/OpenPrinting\/cups-filters\/security\/advisories\/GHSA-p9rh-jxmq-gq47\">https:\/\/github.com\/OpenPrinting\/cups-filters\/security\/advisories\/GHSA-p9rh-jxmq-gq47<\/a><br><a href=\"https:\/\/ubuntu.com\/security\/CVE-2024-47076\">https:\/\/ubuntu.com\/security\/CVE-2024-47076<\/a><br><a href=\"https:\/\/ubuntu.com\/security\/CVE-2024-47175\">https:\/\/ubuntu.com\/security\/CVE-2024-47175<\/a><br><a href=\"https:\/\/ubuntu.com\/security\/CVE-2024-47176\">https:\/\/ubuntu.com\/security\/CVE-2024-47176<\/a><br><a href=\"https:\/\/ubuntu.com\/security\/CVE-2024-47177\">https:\/\/ubuntu.com\/security\/CVE-2024-47177<\/a><br><a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-7041-1\">https:\/\/ubuntu.com\/security\/notices\/USN-7041-1<\/a><br><a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-7042-1\">https:\/\/ubuntu.com\/security\/notices\/USN-7042-1<\/a><br><a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-7043-1\">https:\/\/ubuntu.com\/security\/notices\/USN-7043-1<\/a><br><a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-7044-1\">https:\/\/ubuntu.com\/security\/notices\/USN-7044-1<\/a><br><a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-7045-1\">https:\/\/ubuntu.com\/security\/notices\/USN-7045-1<\/a><br><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-47076\">https:\/\/www.cve.org\/CVERecord?id=CVE-2024-47076<\/a><br><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-47175\">https:\/\/www.cve.org\/CVERecord?id=CVE-2024-47175<\/a><br><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-47176\">https:\/\/www.cve.org\/CVERecord?id=CVE-2024-47176<\/a><br><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-47177\">https:\/\/www.cve.org\/CVERecord?id=CVE-2024-47177<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Demonstrating the New Linux Exploit (9.9 CVSS)\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/cixyRITXaOw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Pendahuluan Common Unix Printing System (CUPS) merupakan salah satu layanan krusial yang digunakan untuk mengelola cetakan di sistem operasi Unix dan Linux. CUPS membantu server dan komputer dalam mengelola pekerjaan cetak, sehingga sangat penting di berbagai lingkungan, baik perkantoran hingga penggunaan rumahan. Namun, kehadiran kerentanan eksekusi kode jarak jauh (Remote Code Execution atau RCE) dalam [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5554,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[181],"tags":[79,179,180],"class_list":["post-5552","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wawasan","tag-linux","tag-security","tag-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Critical CUPS Remote Code Execution Vulnerability: How to Secure Your Linux Server (4 Steps) - Blog | SaidWP<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical CUPS Remote Code Execution Vulnerability: How to Secure Your Linux Server (4 Steps) - Blog | SaidWP\" \/>\n<meta property=\"og:description\" content=\"Pendahuluan Common Unix Printing System (CUPS) merupakan salah satu layanan krusial yang digunakan untuk mengelola cetakan di sistem operasi Unix dan Linux. CUPS membantu server dan komputer dalam mengelola pekerjaan cetak, sehingga sangat penting di berbagai lingkungan, baik perkantoran hingga penggunaan rumahan. Namun, kehadiran kerentanan eksekusi kode jarak jauh (Remote Code Execution atau RCE) dalam [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | SaidWP\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-25T07:51:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/s3.nevaobjects.id\/saidwp-blog\/blog\/wp-content\/uploads\/2024\/10\/27215549\/cups-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SaidWP - Post\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SaidWP - Post\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/uncategorized\\\/critical-cups-remote-code-execution-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/uncategorized\\\/critical-cups-remote-code-execution-vulnerability\\\/\"},\"author\":{\"name\":\"SaidWP - Post\",\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/#\\\/schema\\\/person\\\/fd2527877c2f4049e1f118c039ed4f8d\"},\"headline\":\"Critical CUPS Remote Code Execution Vulnerability: How to Secure Your Linux Server (4 Steps)\",\"datePublished\":\"2024-10-25T07:51:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/uncategorized\\\/critical-cups-remote-code-execution-vulnerability\\\/\"},\"wordCount\":1098,\"image\":{\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/uncategorized\\\/critical-cups-remote-code-execution-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/s3.nevaobjects.id\\\/saidwp-blog\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/27215547\\\/CUPS-CVE-fix-Ubuntu.webp\",\"keywords\":[\"Linux\",\"Security\",\"Vulnerability\"],\"articleSection\":[\"Wawasan &amp; Update\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/uncategorized\\\/critical-cups-remote-code-execution-vulnerability\\\/\",\"url\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/uncategorized\\\/critical-cups-remote-code-execution-vulnerability\\\/\",\"name\":\"Critical CUPS Remote Code Execution Vulnerability: How to Secure Your Linux Server (4 Steps) - Blog | SaidWP\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/uncategorized\\\/critical-cups-remote-code-execution-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/uncategorized\\\/critical-cups-remote-code-execution-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/s3.nevaobjects.id\\\/saidwp-blog\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/27215547\\\/CUPS-CVE-fix-Ubuntu.webp\",\"datePublished\":\"2024-10-25T07:51:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/#\\\/schema\\\/person\\\/fd2527877c2f4049e1f118c039ed4f8d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/uncategorized\\\/critical-cups-remote-code-execution-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/saidwp.com\\\/blog\\\/uncategorized\\\/critical-cups-remote-code-execution-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/uncategorized\\\/critical-cups-remote-code-execution-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/s3.nevaobjects.id\\\/saidwp-blog\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/27215547\\\/CUPS-CVE-fix-Ubuntu.webp\",\"contentUrl\":\"https:\\\/\\\/s3.nevaobjects.id\\\/saidwp-blog\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/27215547\\\/CUPS-CVE-fix-Ubuntu.webp\",\"width\":1280,\"height\":720,\"caption\":\"CUPS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/uncategorized\\\/critical-cups-remote-code-execution-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical CUPS Remote Code Execution Vulnerability: How to Secure Your Linux Server (4 Steps)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/\",\"name\":\"Blog | SaidWP\",\"description\":\"Jasa WP-nya si Said\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/#\\\/schema\\\/person\\\/fd2527877c2f4049e1f118c039ed4f8d\",\"name\":\"SaidWP - Post\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4253b93fa2ef3d268d63a481385921f1985a291cfbe522e59724772966193f17?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4253b93fa2ef3d268d63a481385921f1985a291cfbe522e59724772966193f17?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4253b93fa2ef3d268d63a481385921f1985a291cfbe522e59724772966193f17?s=96&d=mm&r=g\",\"caption\":\"SaidWP - Post\"},\"url\":\"https:\\\/\\\/saidwp.com\\\/blog\\\/author\\\/saidwp-post\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical CUPS Remote Code Execution Vulnerability: How to Secure Your Linux Server (4 Steps) - Blog | SaidWP","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Critical CUPS Remote Code Execution Vulnerability: How to Secure Your Linux Server (4 Steps) - Blog | SaidWP","og_description":"Pendahuluan Common Unix Printing System (CUPS) merupakan salah satu layanan krusial yang digunakan untuk mengelola cetakan di sistem operasi Unix dan Linux. CUPS membantu server dan komputer dalam mengelola pekerjaan cetak, sehingga sangat penting di berbagai lingkungan, baik perkantoran hingga penggunaan rumahan. Namun, kehadiran kerentanan eksekusi kode jarak jauh (Remote Code Execution atau RCE) dalam [&hellip;]","og_url":"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/","og_site_name":"Blog | SaidWP","article_published_time":"2024-10-25T07:51:42+00:00","og_image":[{"width":1000,"height":563,"url":"https:\/\/s3.nevaobjects.id\/saidwp-blog\/blog\/wp-content\/uploads\/2024\/10\/27215549\/cups-2.jpg","type":"image\/jpeg"}],"author":"SaidWP - Post","twitter_card":"summary_large_image","twitter_misc":{"Written by":"SaidWP - Post","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/#article","isPartOf":{"@id":"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/"},"author":{"name":"SaidWP - Post","@id":"https:\/\/saidwp.com\/blog\/#\/schema\/person\/fd2527877c2f4049e1f118c039ed4f8d"},"headline":"Critical CUPS Remote Code Execution Vulnerability: How to Secure Your Linux Server (4 Steps)","datePublished":"2024-10-25T07:51:42+00:00","mainEntityOfPage":{"@id":"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/"},"wordCount":1098,"image":{"@id":"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/s3.nevaobjects.id\/saidwp-blog\/blog\/wp-content\/uploads\/2024\/10\/27215547\/CUPS-CVE-fix-Ubuntu.webp","keywords":["Linux","Security","Vulnerability"],"articleSection":["Wawasan &amp; Update"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/","url":"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/","name":"Critical CUPS Remote Code Execution Vulnerability: How to Secure Your Linux Server (4 Steps) - Blog | SaidWP","isPartOf":{"@id":"https:\/\/saidwp.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/s3.nevaobjects.id\/saidwp-blog\/blog\/wp-content\/uploads\/2024\/10\/27215547\/CUPS-CVE-fix-Ubuntu.webp","datePublished":"2024-10-25T07:51:42+00:00","author":{"@id":"https:\/\/saidwp.com\/blog\/#\/schema\/person\/fd2527877c2f4049e1f118c039ed4f8d"},"breadcrumb":{"@id":"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/#primaryimage","url":"https:\/\/s3.nevaobjects.id\/saidwp-blog\/blog\/wp-content\/uploads\/2024\/10\/27215547\/CUPS-CVE-fix-Ubuntu.webp","contentUrl":"https:\/\/s3.nevaobjects.id\/saidwp-blog\/blog\/wp-content\/uploads\/2024\/10\/27215547\/CUPS-CVE-fix-Ubuntu.webp","width":1280,"height":720,"caption":"CUPS"},{"@type":"BreadcrumbList","@id":"https:\/\/saidwp.com\/blog\/uncategorized\/critical-cups-remote-code-execution-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/saidwp.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Critical CUPS Remote Code Execution Vulnerability: How to Secure Your Linux Server (4 Steps)"}]},{"@type":"WebSite","@id":"https:\/\/saidwp.com\/blog\/#website","url":"https:\/\/saidwp.com\/blog\/","name":"Blog | SaidWP","description":"Jasa WP-nya si Said","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/saidwp.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/saidwp.com\/blog\/#\/schema\/person\/fd2527877c2f4049e1f118c039ed4f8d","name":"SaidWP - Post","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4253b93fa2ef3d268d63a481385921f1985a291cfbe522e59724772966193f17?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4253b93fa2ef3d268d63a481385921f1985a291cfbe522e59724772966193f17?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4253b93fa2ef3d268d63a481385921f1985a291cfbe522e59724772966193f17?s=96&d=mm&r=g","caption":"SaidWP - Post"},"url":"https:\/\/saidwp.com\/blog\/author\/saidwp-post\/"}]}},"_links":{"self":[{"href":"https:\/\/saidwp.com\/blog\/wp-json\/wp\/v2\/posts\/5552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/saidwp.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saidwp.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saidwp.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/saidwp.com\/blog\/wp-json\/wp\/v2\/comments?post=5552"}],"version-history":[{"count":0,"href":"https:\/\/saidwp.com\/blog\/wp-json\/wp\/v2\/posts\/5552\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/saidwp.com\/blog\/wp-json\/wp\/v2\/media\/5554"}],"wp:attachment":[{"href":"https:\/\/saidwp.com\/blog\/wp-json\/wp\/v2\/media?parent=5552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saidwp.com\/blog\/wp-json\/wp\/v2\/categories?post=5552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saidwp.com\/blog\/wp-json\/wp\/v2\/tags?post=5552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}