First published: Thu May 14 2015(Updated: )
The following flaw was found in CUPS: A cross-site scripting bug in the CUPS templating engine allows this bug to be exploited when a user browses the web. This XSS is reachable in the default configuration for Linux instances of CUPS, and allows an attacker to bypass default configuration settings that bind the CUPS scheduler to the 'localhost' or loopback interface. Acknowledgements: Red Hat would like to thank the CERT/CC for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Apple CUPS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.