CVE-2018-4300
Publication date 3 April 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.
Status
Package | Ubuntu Release | Status |
---|---|---|
cups | 20.04 LTS focal |
Not affected
|
18.04 LTS bionic |
Fixed 2.2.7-1ubuntu2.2
|
|
16.04 LTS xenial |
Fixed 2.1.3-4ubuntu0.6
|
|
14.04 LTS trusty |
Fixed 1.7.2-0ubuntu1.11
|
Notes
mdeslaur
Updates for this issue were originally assigned CVE-2018-4700, which was a typo and got rejected.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 · Medium |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |