First published: Thu Jul 12 2018(Updated: )
qutebrowser before version 1.4.1 is vulnerable to a cross-site request forgery flaw that allows websites to access 'qute://*' URLs. A malicious website could exploit this to load a 'qute://settings/set' URL, which then sets 'editor.command' to a bash script, resulting in arbitrary code execution.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/qutebrowser | <1.4.1 | 1.4.1 |
qutebrowser | <1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10895 is classified as a medium severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2018-10895, upgrade qutebrowser to version 1.4.1 or later.
Anyone using qutebrowser versions prior to 1.4.1 is affected by CVE-2018-10895.
CVE-2018-10895 is a cross-site request forgery (CSRF) vulnerability.
Attackers can exploit CVE-2018-10895 to load malicious URLs that can modify user settings and execute arbitrary commands.