CVE-2018-4300
Summary
| CVE | CVE-2018-4300 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-04-03 18:29:00 UTC |
| Updated | 2019-09-28 12:15:00 UTC |
| Description | The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10. |
Risk And Classification
Problem Types: CWE-200
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Release v2.2.10 · apple/cups · GitHub | MISC | github.com | Release Notes, Third Party Advisory |
| [SECURITY] [DLA 1936-1] cups security update | MLIST | lists.debian.org | |
| CUPS CVE-2018-4300 Security Weakness | BID | www.securityfocus.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.