Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xmmc-fgrf-gp3v

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The web interface (cgi-bin/admin.c) in CUPS before 1.3.8 uses the guest username when a user is not logged on to the web server, which makes it easier for remote attackers to bypass intended policy and conduct CSRF attacks via the (1) add and (2) cancel RSS subscription functions.

The web interface (cgi-bin/admin.c) in CUPS before 1.3.8 uses the guest username when a user is not logged on to the web server, which makes it easier for remote attackers to bypass intended policy and conduct CSRF attacks via the (1) add and (2) cancel RSS subscription functions.

EPSS

Процентиль: 49%
0.00285
Низкий

Связанные уязвимости

ubuntu
почти 17 лет назад

The web interface (cgi-bin/admin.c) in CUPS before 1.3.8 uses the guest username when a user is not logged on to the web server, which makes it easier for remote attackers to bypass intended policy and conduct CSRF attacks via the (1) add and (2) cancel RSS subscription functions.

redhat
больше 17 лет назад

The web interface (cgi-bin/admin.c) in CUPS before 1.3.8 uses the guest username when a user is not logged on to the web server, which makes it easier for remote attackers to bypass intended policy and conduct CSRF attacks via the (1) add and (2) cancel RSS subscription functions.

nvd
почти 17 лет назад

The web interface (cgi-bin/admin.c) in CUPS before 1.3.8 uses the guest username when a user is not logged on to the web server, which makes it easier for remote attackers to bypass intended policy and conduct CSRF attacks via the (1) add and (2) cancel RSS subscription functions.

debian
почти 17 лет назад

The web interface (cgi-bin/admin.c) in CUPS before 1.3.8 uses the gues ...

EPSS

Процентиль: 49%
0.00285
Низкий