The web interface (cgi-bin/admin.c) in CUPS before 1.3.8 uses the guest username when a user is not logged on to the web server, which makes it easier for remote attackers to bypass intended policy and conduct CSRF attacks via the (1) add and (2) cancel RSS subscription functions.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:53
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html - | |
| References | () http://www.cups.org/str.php?L2774 - | |
| References | () http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/ - Exploit | |
| References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:028 - | |
| References | () http://www.openwall.com/lists/oss-security/2008/11/19/3 - | 
Information
                Published : 2008-11-21 02:30
Updated : 2025-04-09 00:30
NVD link : CVE-2008-5184
Mitre link : CVE-2008-5184
CVE.ORG link : CVE-2008-5184
JSON object : View
Products Affected
                apple
- cups
CWE
                
                    
                        
                        CWE-255
                        
            Credentials Management Errors
