First published: Fri May 10 2013(Updated: )
It was reported [1] that when KDE encounters an "internal server error" and also prints out the URL that caused the error that it would include the username and password (if supplied) to the resource that caused the error. For instance, it would show "<a href="https://user:password@remotehost.com">https://user:password@remotehost.com</a>" or similar. This is due to kioslave/http/http.cpp using m_request.url.url() rather than the sanitized m_request.url.prettyUrl(). This issue is fixed in git [2]. Note that this information is printed out to the local user actively using the computer. [1] <a href="https://bugs.kde.org/show_bug.cgi?id=319428">https://bugs.kde.org/show_bug.cgi?id=319428</a> [2] <a href="https://projects.kde.org/projects/kde/kdelibs/repository/revisions/65d736dab592bced4410ccfa4699de89f78c96ca/diff/kioslave/http/http.cpp">https://projects.kde.org/projects/kde/kdelibs/repository/revisions/65d736dab592bced4410ccfa4699de89f78c96ca/diff/kioslave/http/http.cpp</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat kdelibs | <65d736dab592bced4410ccfa4699de89f78c96ca |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is REDHAT-BUG-961981.
The affected software version for REDHAT-BUG-961981 is KDE kdelibs versions prior to 65d736dab592bced4410ccfa4699de89f78c96ca.
The vulnerability REDHAT-BUG-961981 leaks usernames and passwords in URLs when an internal server error occurs.
To mitigate the risks associated with REDHAT-BUG-961981, upgrade KDE kdelibs to a version after the affected commit.
Yes, updating to a version of KDE kdelibs that is higher than 65d736dab592bced4410ccfa4699de89f78c96ca addresses the REDHAT-BUG-961981 vulnerability.