Bug 695398 (CVE-2011-1168)

Summary: CVE-2011-1168 kdelibs: partially universal XSS in Konqueror error pages
Product: [Other] Security Response Reporter: Vincent Danen <vdanen>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jlieskov, jreznik, kevin, ltinkl, rdieter, rnovacek, smparrish, than
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-04-06 02:12:59 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 695662, 695663    
Bug Blocks:    

Description Vincent Danen 2011-04-11 15:45:24 UTC
It was reported [1] that Konqueror in KDE 4.4.0 through to and including 4.6.1 is vulnerable to a partially universal XSS in error pages.  When Konqueror cannot fetch a requested URL, it renders an error page that contains the given URL.  If the URL were to contain JavaScript or HTML code, the code is also rendered which could allow for a user to be tricked into visiting a malicious web site or to provide credentials to an untrusted party.

Patches are available for the 4.4, 4.5, and 4.6 branches, linked to from the upstream security advisory.

[1] http://www.kde.org/info/security/advisory-20110411-1.txt

Comment 1 Vincent Danen 2011-04-11 15:53:17 UTC
This affects Red Hat Enterprise Linux 6 and Fedora.  It does not affect Red Hat Enterprise Linux 5 and earlier.

Comment 2 Tomas Hoger 2011-04-12 10:11:16 UTC
Nth Dimension advisory:
http://www.nth-dimension.org.uk/pub/NDSA20110321.txt.asc

Link to upstream master branch commit:
https://projects.kde.org/projects/kde/kdelibs/repository/revisions/aaa8c42

IDs of the commits in other upstream branches are listed in the upstream advisory, as already pointed out in comment #0.

Comment 5 errata-xmlrpc 2011-04-21 16:57:31 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:0464 https://rhn.redhat.com/errata/RHSA-2011-0464.html