Search for vulnerabilities
Vulnerability details: VCID-rpu2-z2n7-aaac
Vulnerability ID VCID-rpu2-z2n7-aaac
Aliases CVE-2010-1748
Summary The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstrated by the (1) /admin?OP=redirect&URL=% and (2) /admin?URL=/admin/&OP=% URIs.
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2010:0490
epss 0.01264 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.01264 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.01264 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.01264 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.01264 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.01264 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.01264 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.01264 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.01264 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.01264 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.01264 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.01271 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.01271 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.01271 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.01271 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.13402 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
epss 0.25852 https://api.first.org/data/v1/epss?cve=CVE-2010-1748
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=591983
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2010-1748
Data source Exploit-DB
Date added June 15, 2010
Description CUPS 1.4.2 - Web Interface Information Disclosure
Ransomware campaign use Known
Source publication date June 15, 2010
Exploit type remote
Platform linux
Source update date July 23, 2014
Source URL https://www.securityfocus.com/bid/40897/info
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2010-1748
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.86031
EPSS Score 0.01264
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.