CVE-2018-4300
Publication date 3 April 2019
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| cups | 20.04 LTS focal |
Not affected
|
| 18.04 LTS bionic |
Fixed 2.2.7-1ubuntu2.2
|
|
| 16.04 LTS xenial |
Fixed 2.1.3-4ubuntu0.6
|
|
| 14.04 LTS trusty |
Fixed 1.7.2-0ubuntu1.11
|
Notes
mdeslaur
Updates for this issue were originally assigned CVE-2018-4700, which was a typo and got rejected.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | High |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | None |
| Availability impact | None |
| Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |