Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <117766656.42614424.1354633106738.JavaMail.root@redhat.com>
Date: Tue, 4 Dec 2012 09:58:26 -0500 (EST)
From: Jan Lieskovsky <jlieskov@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>,
        "Richard J. Moore" <rich@....org>
Subject: CVE Request -- Qt (x < 4.8.4): QML XmlHttpRequest insecure
 redirection

Hello Kurt, Steve, vendors,

  Qt upstream has released 4.8.4 version correcting one security
issue:

An information disclosure flaw was found in the way XMLHttpRequest
object implementation in Qt, a software toolkit for developing
applications, performed management of certain HTTP responses.
Previous implementation allowed redirection from HTTP protocol
to file schemas. Also the redirection handling was performed
automatically by QML application and could not be disabled.
A remote attacker could use this flaw to cause QML application
in an unauthorized way to read local file content by causing
the HTTP response for the application to be a redirect to
a file: URL (file scheme).

References:
[1] http://lists.qt-project.org/pipermail/announce/2012-November/000014.html
[2] https://bugzilla.redhat.com/show_bug.cgi?id=883415

Relevant upstream patch:
[3] https://codereview.qt-project.org/#change,40034

Could you allocate a CVE id for this?

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.