|
Message-ID: <20130510212833.GB30055@redhat.com> Date: Fri, 10 May 2013 15:28:33 -0600 From: Vincent Danen <vdanen@...hat.com> To: oss-security@...ts.openwall.com Subject: CVE request: password exposure in kdelibs when showing "internal server error" messages I've not seen this yet; could a CVE be assigned to the following issue? It was reported that when KDE encounters an "internal server error" and also prints out the URL that caused the error that it would include the username and password (if supplied) to the resource that caused the error. For instance, it would show "https://user:password@...otehost.com" or similar. This is due to kioslave/http/http.cpp using m_request.url.url() rather than the sanitized m_request.url.prettyUrl(). This issue is fixed in git. Note that this information is printed out to the local user actively using the computer. References: https://bugs.kde.org/show_bug.cgi?id=319428 https://projects.kde.org/projects/kde/kdelibs/repository/revisions/65d736dab592bced4410ccfa4699de89f78c96ca/diff/kioslave/http/http.cpp https://bugs.mageia.org/show_bug.cgi?id=10037 https://bugzilla.redhat.com/show_bug.cgi?id=961981 -- Vincent Danen / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.