The following flaw was found in CUPS: A cross-site scripting bug in the CUPS templating engine allows this bug to be exploited when a user browses the web. This XSS is reachable in the default configuration for Linux instances of CUPS, and allows an attacker to bypass default configuration settings that bind the CUPS scheduler to the 'localhost' or loopback interface. Acknowledgements: Red Hat would like to thank the CERT/CC for reporting this issue.
Public via: https://www.cups.org/str.php?L4609
Created cups tracking bugs for this issue: Affects: fedora-all [bug 1229979]
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2015:1123 https://rhn.redhat.com/errata/RHSA-2015-1123.html
Reference: http://googleprojectzero.blogspot.in/2015/06/owning-internet-printing-case-study-in.html
cups-2.0.3-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
cups-1.7.5-17.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
Statement: This issue affects the version of cups package as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Important security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.