The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107785 | Third Party Advisory |
https://github.com/apple/cups/releases/tag/v2.2.10 | Release Notes Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html | |
http://www.securityfocus.com/bid/107785 | Third Party Advisory |
https://github.com/apple/cups/releases/tag/v2.2.10 | Release Notes Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html |
Configurations
History
21 Nov 2024, 04:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/107785 - Third Party Advisory | |
References | () https://github.com/apple/cups/releases/tag/v2.2.10 - Release Notes, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html - |
Information
Published : 2019-04-03 18:29
Updated : 2024-11-21 04:07
NVD link : CVE-2018-4300
Mitre link : CVE-2018-4300
CVE.ORG link : CVE-2018-4300
JSON object : View
Products Affected
apple
- cups
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor