Vulnerability Details : CVE-2014-2856
Cross-site scripting (XSS) vulnerability in scheduler/client.c in Common Unix Printing System (CUPS) before 1.7.2 allows remote attackers to inject arbitrary web script or HTML via the URL path, related to the is_path_absolute function.
Vulnerability category: Cross site scripting (XSS)
Threat overview for CVE-2014-2856
Top countries where our scanners detected CVE-2014-2856
Top open port discovered on systems with this issue
631
IPs affected by CVE-2014-2856 19,278
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2014-2856!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2014-2856
Probability of exploitation activity in the next 30 days: 0.86%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 80 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-2856
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2014-2856
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-2856
-
http://www.cups.org/documentation.php/relnotes.html
Page Has Moved - CUPS.org
-
http://www.ubuntu.com/usn/USN-2172-1
USN-2172-1: CUPS vulnerability | Ubuntu security notices
-
http://rhn.redhat.com/errata/RHSA-2014-1388.html
RHSA-2014:1388 - Security Advisory - Red Hat Customer Portal
-
http://www.securityfocus.com/bid/66788
CUPS Web Interface Cross Site Scripting Vulnerability
-
http://www.cups.org/str.php?L4356
XSS in CUPS 1.6.4 web interface · Issue #4356 · apple/cups · GitHub
-
http://www.openwall.com/lists/oss-security/2014/04/14/2
oss-security - CVE request: cross-site scripting issue fixed in CUPS 1.7.2
-
http://www.openwall.com/lists/oss-security/2014/04/15/3
oss-security - Re: CVE request: cross-site scripting issue fixed in CUPS 1.7.2
-
http://advisories.mageia.org/MGASA-2014-0193.html
Mageia Advisory: MGASA-2014-0193 - Updated cups packages fix CVE-2014-2856
Products affected by CVE-2014-2856
- cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.4:b3:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.4:b1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.4:b2:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.6:rc1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.6:b1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.5:b2:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.5:b1:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:1.6.1:*:*:*:*:*:*:*