Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-4300

Опубликовано: 03 апр. 2019
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.

Отчет

This vulnerability was originally assigned CVE-2018-4700, but after the publication of security errata the identifier was changed to CVE-2018-4300. Both identifiers refer to the same vulnerability. Since some sources use CVE-2018-4700 and others use CVE-2018-4300, Red Hat security advisories for this vulnerability have been amended to include both identifiers.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5cupsWill not fix
Red Hat Enterprise Linux 6cupsWill not fix
Red Hat Enterprise Linux 8cupsNot affected
Red Hat Virtualization 4redhat-virtualization-hostNot affected
Red Hat Enterprise Linux 7cupsFixedRHSA-2020:105031.03.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-330
https://bugzilla.redhat.com/show_bug.cgi?id=1695929cups: Session cookie generated by the CUPS web interface is easy to guess

EPSS

Процентиль: 59%
0.00374
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 7 лет назад

The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.

CVSS3: 5.9
nvd
почти 7 лет назад

The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.

CVSS3: 5.9
debian
почти 7 лет назад

The session cookie generated by the CUPS web interface was easy to gue ...

CVSS3: 5.9
github
больше 3 лет назад

The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.

CVSS3: 5.9
fstec
около 7 лет назад

Уязвимость веб-интерфейса сервера печати CUPS, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 59%
0.00374
Низкий

7.3 High

CVSS3