pysec-2018-26
Vulnerability from pysec
Published
2018-06-26 16:29
Modified
2021-06-10 06:51
Details
qutebrowser version introduced in v0.11.0 (1179ee7a937fb31414d77d9970bac21095358449) contains a Cross Site Scripting (XSS) vulnerability in history command, qute://history page that can result in Via injected JavaScript code, a website can steal the user's browsing history. This attack appear to be exploitable via the victim must open a page with a specially crafted attribute, and then open the qute://history site via the :history command. This vulnerability appears to have been fixed in fixed in v1.3.3 (4c9360237f186681b1e3f2a0f30c45161cf405c7, to be released today) and v1.4.0 (5a7869f2feaa346853d2a85413d6527c87ef0d9f, released later this week).
Impacted products
| Name | purl | qutebrowser | pkg:pypi/qutebrowser |
|---|
Aliases
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "qutebrowser",
"purl": "pkg:pypi/qutebrowser"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5a7869f2feaa346853d2a85413d6527c87ef0d9f"
},
{
"fixed": "4c9360237f186681b1e3f2a0f30c45161cf405c7"
}
],
"repo": "https://github.com/qutebrowser/qutebrowser",
"type": "GIT"
},
{
"events": [
{
"introduced": "0.11.0"
},
{
"fixed": "1.3.3"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"0.11.0",
"0.11.1",
"1.0.0",
"1.0.1",
"1.0.2",
"1.0.3",
"1.0.4",
"1.1.0",
"1.1.1",
"1.1.2",
"1.2.0",
"1.2.1",
"1.3.0",
"1.3.1",
"1.3.2"
]
}
],
"aliases": [
"CVE-2018-1000559",
"GHSA-m4fw-77v7-924m"
],
"details": "qutebrowser version introduced in v0.11.0 (1179ee7a937fb31414d77d9970bac21095358449) contains a Cross Site Scripting (XSS) vulnerability in history command, qute://history page that can result in Via injected JavaScript code, a website can steal the user\u0027s browsing history. This attack appear to be exploitable via the victim must open a page with a specially crafted \u003ctitle\u003e attribute, and then open the qute://history site via the :history command. This vulnerability appears to have been fixed in fixed in v1.3.3 (4c9360237f186681b1e3f2a0f30c45161cf405c7, to be released today) and v1.4.0 (5a7869f2feaa346853d2a85413d6527c87ef0d9f, released later this week).",
"id": "PYSEC-2018-26",
"modified": "2021-06-10T06:51:59.879286Z",
"published": "2018-06-26T16:29:00Z",
"references": [
{
"type": "REPORT",
"url": "https://github.com/qutebrowser/qutebrowser/issues/4011"
},
{
"type": "FIX",
"url": "https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f"
},
{
"type": "FIX",
"url": "https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-m4fw-77v7-924m"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…