Cross-site scripting (XSS) vulnerability in scheduler/client.c in Common Unix Printing System (CUPS) before 1.7.2 allows remote attackers to inject arbitrary web script or HTML via the URL path, related to the is_path_absolute function.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://secunia.com/advisories/57880 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/66788 | vdb entry |
http://www.ubuntu.com/usn/USN-2172-1 | vendor advisory |
http://www.openwall.com/lists/oss-security/2014/04/14/2 | mailing list |
http://rhn.redhat.com/errata/RHSA-2014-1388.html | vendor advisory |
http://advisories.mageia.org/MGASA-2014-0193.html | |
http://www.cups.org/documentation.php/relnotes.html | |
http://www.cups.org/str.php?L4356 | |
http://www.openwall.com/lists/oss-security/2014/04/15/3 | mailing list |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:108 | vendor advisory |