Using a malicious PAC file, and then using exfiltration methods in the PAC function FindProxyForURL() enables the attacker to expose full https URLs. This is a security issue since https URLs may contain sensitive information in the URL authentication part (user:password@host), and in the path and the query (e.g. access tokens). This attack can be carried out remotely (over the LAN) since proxy settings allow “Detect Proxy Configuration Automatically”. This setting uses WPAD to retrieve the PAC file, and an attacker who has access to the victim’s LAN can interfere with the WPAD protocols (DHCP/DNS+HTTP) and inject his/her own malicious PAC instead of the legitimate one. External References: https://www.kde.org/info/security/advisory-20170228-1.txt Upstream patches: kio: https://commits.kde.org/kio/f9d0cb47cf94e209f6171ac0e8d774e68156a6e4 kdelibs: https://commits.kde.org/kdelibs/1804c2fde7bf4e432c6cf5bb8cce5701c7010559
Created kdelibs tracking bugs for this issue: Affects: fedora-all [bug 1427813] Created kf5-kio tracking bugs for this issue: Affects: epel-7 [bug 1427812] Affects: fedora-all [bug 1427814]
kdelibs3-3.5.10-84.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
kdelibs3-3.5.10-84.fc25 has been pushed to the Fedora 25 stable repository. If problems still persist, please make note of it in this bug report.