A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2018-02-16T17:00:00
Updated: 2024-08-05T21:13:49.106Z
Reserved: 2018-02-16T00:00:00
Link: CVE-2017-18190
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2018-02-16T17:29:00.217
Modified: 2019-10-03T00:03:26.223
Link: CVE-2017-18190
Redhat