The web interface (cgi-bin/admin.c) in CUPS before 1.3.8 uses the guest username when a user is not logged on to the web server, which makes it easier for remote attackers to bypass intended policy and conduct CSRF attacks via the (1) add and (2) cancel RSS subscription functions.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html - | |
References | () http://www.cups.org/str.php?L2774 - | |
References | () http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/ - Exploit | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:028 - | |
References | () http://www.openwall.com/lists/oss-security/2008/11/19/3 - |
Information
Published : 2008-11-21 02:30
Updated : 2024-11-21 00:53
NVD link : CVE-2008-5184
Mitre link : CVE-2008-5184
CVE.ORG link : CVE-2008-5184
JSON object : View
Products Affected
apple
- cups
CWE
CWE-255
Credentials Management Errors