Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-34978— OpenPrinting CUPS: Path traversal in RSS notify-recipient-uri enables file write outside CacheDir/rss (and clobbering of job.cache)

CVSS 6.5 · Medium EPSS 0.08% · P24
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-34978

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
OpenPrinting CUPS: Path traversal in RSS notify-recipient-uri enables file write outside CacheDir/rss (and clobbering of job.cache)
Source: NVD (National Vulnerability Database)
Vulnerability Description
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, the RSS notifier allows .. path traversal in notify-recipient-uri (e.g., rss:///../job.cache), letting a remote IPP client write RSS XML bytes outside CacheDir/rss (anywhere that is lp-writable). In particular, because CacheDir is group-writable by default (typically root:lp and mode 0770), the notifier (running as lp) can replace root-managed state files via temp-file + rename(). This PoC clobbers CacheDir/job.cache with RSS XML, and after restarting cupsd the scheduler fails to parse the job cache and previously queued jobs disappear. At time of publication, there are no publicly available patches.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenPrinting CUPS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenPrinting CUPS是OpenPrinting公司的一个适用于 Linux® 和其他类 Unix® 操作系统的基于标准的开源打印系统。 OpenPrinting CUPS 2.4.16及之前版本存在安全漏洞,该漏洞源于RSS通知程序允许notify-recipient-uri中存在路径遍历,可能导致远程IPP客户端在CacheDir/rss之外写入RSS XML字节。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
OpenPrintingcups <= 2.4.16 -

II. Public POCs for CVE-2026-34978

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-34978

登录查看更多情报信息。

Same Patch Batch · OpenPrinting · 2026-04-03 · 5 CVEs total

CVE-2026-349795.3 MEDIUMOpenPrinting CUPS: Heap overflow in `get_options()`
CVE-2026-274474.8 MEDIUMOpenPrinting CUPS: Authorization bypass via case-insensitive group-member lookup
CVE-2026-34980OpenPrinting CUPS: Shared PostScript queue lets anonymous Print-Job requests reach `lp` co
CVE-2026-34990OpenPrinting CUPS: Local print admin token disclosure using temporary printers

IV. Related Vulnerabilities

V. Comments for CVE-2026-34978

No comments yet


Leave a comment