Cross-site scripting in CUPS - CVE-2014-2856
Published: April 18, 2014 / Updated: July 28, 2020
CUPS
Detailed vulnerability description
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in scheduler/client.c in Common Unix Printing System (CUPS) before 1.7.2 when processing URL path, related to the is_path_absolute function. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
How to mitigate CVE-2014-2856
Sources
- http://advisories.mageia.org/MGASA-2014-0193.html
- http://rhn.redhat.com/errata/RHSA-2014-1388.html
- http://secunia.com/advisories/57880
- http://www.cups.org/documentation.php/relnotes.html
- http://www.cups.org/str.php?L4356
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
- http://www.openwall.com/lists/oss-security/2014/04/14/2
- http://www.openwall.com/lists/oss-security/2014/04/15/3
- http://www.securityfocus.com/bid/66788
- http://www.ubuntu.com/usn/USN-2172-1