An issue was discovered in PrinterOn Central Print Services (CPS) through 4.1.4. The core components that create and launch a print job do not perform complete verification of the session cookie that is supplied to them. As a result, an attacker with guest/pseudo-guest level permissions can bypass the session checks (that would otherwise logout a low-privileged user) by calling the core print job components directly via crafted HTTP GET and POST requests.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-8972 An issue was discovered in PrinterOn Central Print Services (CPS) through 4.1.4. The core components that create and launch a print job do not perform complete verification of the session cookie that is supplied to them. As a result, an attacker with guest/pseudo-guest level permissions can bypass the session checks (that would otherwise logout a low-privileged user) by calling the core print job components directly via crafted HTTP GET and POST requests.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T10:47:03.934Z

Reserved: 2018-09-19T00:00:00

Link: CVE-2018-17210

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-07-20T00:15:11.397

Modified: 2024-11-21T03:54:06.130

Link: CVE-2018-17210

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.