23 - Web Services
CUPS 1.4
CUPS 1.4.2 - Web Interface Information Disclosure | linux/remote/34152.txt
CUPS < 2.0.3 - Multiple Vulnerabilities | multiple/remote/37336.txt
CUPS < 2.0.3 - Remote Command Execution | linux/remote/41233.py
╰─ bypass-403 http://192.168.135.41:23/
____ _ _ ___ _____
| __ ) _ _ _ __ __ _ ___ ___ | || | / _ \___ /
| _ \| | | | '_ \ / _` / __/ __|_____| || |_| | | ||_ \
| |_) | |_| | |_) | (_| \__ \__ \_____|__ _| |_| |__) |
|____/ \__, | .__/ \__,_|___/___/ |_| \___/____/
|___/|_|
By Iam_J0ker
./bypass-403.sh https://example.com path
405,332 --> http://192.168.135.41:23//
405,332 --> http://192.168.135.41:23//%2e/
405,332 --> http://192.168.135.41:23///.
405,332 --> http://192.168.135.41:23/////
405,332 --> http://192.168.135.41:23//.//./
405,332 --> http://192.168.135.41:23// -H X-Original-URL:
405,332 --> http://192.168.135.41:23// -H X-Custom-IP-Authorization: 127.0.0.1
405,332 --> http://192.168.135.41:23// -H X-Forwarded-For: http://127.0.0.1
405,332 --> http://192.168.135.41:23// -H X-Forwarded-For: 127.0.0.1:80
403,336 --> http://192.168.135.41:23/ -H X-rewrite-url:
405,332 --> http://192.168.135.41:23//%20
405,332 --> http://192.168.135.41:23//%09
405,332 --> http://192.168.135.41:23//?
405,332 --> http://192.168.135.41:23//.html
405,332 --> http://192.168.135.41:23///?anything
405,332 --> http://192.168.135.41:23//#
405,332 --> http://192.168.135.41:23// -H Content-Length:0 -X POST
405,332 --> http://192.168.135.41:23///*
405,332 --> http://192.168.135.41:23//.php
405,332 --> http://192.168.135.41:23//.json
405,332 --> http://192.168.135.41:23// -X TRACE
405,332 --> http://192.168.135.41:23// -H X-Host: 127.0.0.1
405,332 --> http://192.168.135.41:23//..;/
000,0 --> http://192.168.135.41:23//;/
405,332 --> http://192.168.135.41:23// -X TRACE
╭─ /home/kali/bypass-403 main !1 ?1 ▓▒oWas not able to get hte exploit to work.
Last updated