A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T21:13:49.106Z
Reserved: 2018-02-16T00:00:00
Link: CVE-2017-18190

No data.

Status : Modified
Published: 2018-02-16T17:29:00.217
Modified: 2024-11-21T03:19:31.260
Link: CVE-2017-18190
