Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r8jg-q736-v263

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.

lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.

EPSS

Процентиль: 14%
0.00046
Низкий

Дефекты

CWE-59

Связанные уязвимости

ubuntu
около 12 лет назад

lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.

redhat
около 12 лет назад

lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.

nvd
около 12 лет назад

lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.

debian
около 12 лет назад

lppasswd in CUPS before 1.7.1, when running with setuid privileges, al ...

EPSS

Процентиль: 14%
0.00046
Низкий

Дефекты

CWE-59