lppasswd in CUPS before 1.7.1, when running with setuid...
Low severity
Unreviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Jan 28, 2023
Description
Published by the National Vulnerability Database
Jan 26, 2014
Published to the GitHub Advisory Database
May 17, 2022
Last updated
Jan 28, 2023
lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.
References