summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRoman Bogorodskiy <novel@FreeBSD.org>2018-07-15 06:25:24 +0000
committerRoman Bogorodskiy <novel@FreeBSD.org>2018-07-15 06:25:24 +0000
commit7998db574182b0c550783efba158317649fb93e0 (patch)
treec14204a08dd1756fd81562f9d444a6aa8d1b048f
parentAdd support for GCC 8 (and the newly added lang/gcc8 port). USE_GCC=8+ (diff)
Document www/qutebrowser CSRF vulnerability
Reviewed by: miwi Security: CVE-2018-10895
-rw-r--r--security/vuxml/vuln.xml29
1 files changed, 29 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 16ab0268692e..1eeb2bac16cc 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,35 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="bd6cf187-8710-11e8-833d-18a6f7016652">
+ <topic>qutebrowser -- Remote code execution due to CSRF</topic>
+ <affects>
+ <package>
+ <name>qutebrowser</name>
+ <range><ge>1.0.0</ge><lt>1.4.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>qutebrowser team reports:</p>
+ <blockquote cite="https://blog.qutebrowser.org/cve-2018-10895-remote-code-execution-due-to-csrf-in-qutebrowser.html">
+ <p>Due to a CSRF vulnerability affecting the qute://settings page,
+ it was possible for websites to modify qutebrowser settings.
+ Via settings like editor.command, this possibly allowed websites
+ to execute arbitrary code.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://seclists.org/oss-sec/2018/q3/29</url>
+ <cvename>CVE-2018-10895</cvename>
+ </references>
+ <dates>
+ <discovery>2018-07-11</discovery>
+ <entry>2018-07-14</entry>
+ </dates>
+ </vuln>
+
<vuln vid="e78732b2-8528-11e8-9c42-6451062f0f7a">
<topic>Flash Player -- multiple vulnerabilities</topic>
<affects>