First published: Fri May 10 2013(Updated: )
It was reported [1] that when KDE encounters an "internal server error" and also prints out the URL that caused the error that it would include the username and password (if supplied) to the resource that caused the error. For instance, it would show "<a href="https://user:password@remotehost.com">https://user:password@remotehost.com</a>" or similar. This is due to kioslave/http/http.cpp using m_request.url.url() rather than the sanitized m_request.url.prettyUrl(). This issue is fixed in git [2]. Note that this information is printed out to the local user actively using the computer. [1] <a href="https://bugs.kde.org/show_bug.cgi?id=319428">https://bugs.kde.org/show_bug.cgi?id=319428</a> [2] <a href="https://projects.kde.org/projects/kde/kdelibs/repository/revisions/65d736dab592bced4410ccfa4699de89f78c96ca/diff/kioslave/http/http.cpp">https://projects.kde.org/projects/kde/kdelibs/repository/revisions/65d736dab592bced4410ccfa4699de89f78c96ca/diff/kioslave/http/http.cpp</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
KDE kdelibs3 | <=4.10.3 | |
KDE kdelibs3 | =4.10.0 | |
KDE kdelibs3 | =4.10.1 | |
KDE kdelibs3 | =4.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2074 is considered a moderate severity vulnerability due to the potential exposure of sensitive information.
To mitigate CVE-2013-2074, upgrade to kdelibs version 4.10.4 or later, where the issue has been addressed.
CVE-2013-2074 can lead to the unintentional disclosure of usernames and passwords in error messages.
CVE-2013-2074 affects kdelibs versions 4.10.0 through 4.10.3.
No, the vulnerability does not allow for remote exploitation but can expose credentials if the web server returns an internal server error.