cups is vulnerable to cross-site scripting (XSS) attacks. The vulnerability exists as scheduler/client.c in Common Unix Printing System (CUPS) before 1.7.2 allows remote attackers to inject arbitrary web script or HTML via the URL path, related to the is_path_absolute function.
advisories.mageia.org/MGASA-2014-0193.html
rhn.redhat.com/errata/RHSA-2014-1388.html
secunia.com/advisories/57880
www.cups.org/documentation.php/relnotes.html
www.cups.org/str.php?L4356
www.mandriva.com/security/advisories?name=MDVSA-2015:108
www.openwall.com/lists/oss-security/2014/04/14/2
www.openwall.com/lists/oss-security/2014/04/15/3
www.securityfocus.com/bid/66788
www.ubuntu.com/usn/USN-2172-1
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.6_Technical_Notes/cups.html#RHSA-2014-1388
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1012482
bugzilla.redhat.com/show_bug.cgi?id=978387
rhn.redhat.com/errata/RHSA-2014-1388.html