The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107785 | Third Party Advisory |
https://github.com/apple/cups/releases/tag/v2.2.10 | Release Notes Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html |
Configurations
History
No history.
Information
Published : 2019-04-03 18:29
Updated : 2024-02-04 20:20
NVD link : CVE-2018-4300
Mitre link : CVE-2018-4300
CVE.ORG link : CVE-2018-4300
JSON object : View
Products Affected
apple
- cups
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor