The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.
References
Link | Resource |
---|---|
https://github.com/apple/cups/releases/tag/v2.2.10 | Release Notes Third Party Advisory |
http://www.securityfocus.com/bid/107785 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html |
Configurations
Information
Published : 2019-04-03 11:29
Updated : 2019-09-28 05:15
NVD link : CVE-2018-4300
Mitre link : CVE-2018-4300
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
apple
- cups