First published: Thu May 14 2015(Updated: )
The following flaw was found in CUPS: A cross-site scripting bug in the CUPS templating engine allows this bug to be exploited when a user browses the web. This XSS is reachable in the default configuration for Linux instances of CUPS, and allows an attacker to bypass default configuration settings that bind the CUPS scheduler to the 'localhost' or loopback interface. Acknowledgements: Red Hat would like to thank the CERT/CC for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS libraries |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1221642 is considered high due to the potential for cross-site scripting (XSS) exploitation.
To fix REDHAT-BUG-1221642, you need to update your CUPS installation to the latest secure version provided by your distributor.
REDHAT-BUG-1221642 affects the default configuration of Linux instances of CUPS widely in use.
Yes, REDHAT-BUG-1221642 can be exploited by an attacker without requiring user authentication due to the nature of the XSS vulnerability.
The potential impacts of REDHAT-BUG-1221642 include the ability for an attacker to execute arbitrary scripts in the context of the user's browser, leading to data theft or session hijacking.