CVE-2018-4300
Severity
5.9MEDIUM
EPSS
0.4%
top 40.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 3
Latest updateMay 13
Description
The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6
Affected Packages3 packages
🔴Vulnerability Details
3GHSA▶
GHSA-7w9x-rg6m-2fh9: The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the↗2022-05-13
CVEList▶
CVE-2018-4300: The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the↗2019-04-03
OSV▶
CVE-2018-4300: The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the↗2019-04-03
📋Vendor Advisories
4Debian▶
CVE-2018-4300: cups - The session cookie generated by the CUPS web interface was easy to guess on Linu...↗2018
💬Community
1Bugzilla
▶