[UNIX] Konqueror Cross Site Scripting Vulnerability

From: support@securiteam.com
Date: 09/12/02


From: support@securiteam.com
To: list@securiteam.com
Date: Thu, 12 Sep 2002 08:28:02 +0200 (CEST)

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -

  Konqueror Cross Site Scripting Vulnerability
------------------------------------------------------------------------

SUMMARY

Konqueror's cross Site scripting protection fails to initialize the
domains on sub-(i)frames correctly. As a result, JavaScript can access any
foreign subframe that is defined in the HTML source.

DETAILS

Vulnerable systems:
 * KDE version 2.2.2
 * KDE versions 3.0 - 3.0.3

Impact:
Users of Konqueror and other KDE software that uses the KHTML rendering
engine may fall victim of a cookie stealing and other cross-site scripting
attacks.

Solution:
Apply the appended patch to kdelibs, update to the kdelibs-3.0.3a or, as a
workaround, disable JavaScript or cookies.

kdelibs-3.0.3a can be downloaded from:
<http://download.kde.org/stable/3.0.3>
http://download.kde.org/stable/3.0.3 : 02627f595af113f7d544561a7ff6ec85
kdelibs-3.0.3a.tar.bz2

Patch:
A patch for KDE 3.0.3 is available from
<ftp://ftp.kde.org/pub/kde/security_patches>
ftp://ftp.kde.org/pub/kde/security_patches :
523b2fb677310792cbb04861f358d08d post-3.0.3-kdelibs-khtml.diff

A patch for KDE 2.2.2 is available from
<ftp://ftp.kde.org/pub/kde/security_patches>
ftp://ftp.kde.org/pub/kde/security_patches :
b0b23c3caa062c60375a1160418a2810 post-2.2.2-kdelibs-khtml.diff

ADDITIONAL INFORMATION

The information has been provided by <mailto:mueller@kde.org> Dirk
Mueller.

========================================

This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [UNIX] Konqueror Secure Cookie Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... * Konqueror in KDE 2.2.2 and KDE 3.0.3 ... A secure session that relies solely on secure cookies for identifying the ... Upgrade to KDE 3.0.3 in which this problem is fixed or apply the patch ...
    (Securiteam)
  • [UNIX] KGhostView Arbitrary Code Execution
    ... triggered by malformed postscript or Adobe PDF files. ... * KGhostView of any KDE release between KDE 1.1 and KDE 3.0.3a ... Apply the patch listed in section 5 to kdegraphics/kghostview, ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
    (Securiteam)
  • [UNIX] kpf Directory Traversal
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... A feature added in KDE 3.0.1 accidentally allowed retrieving any file, ... Files not stored in the shared directory were remotely retrievable. ... Apply the patch listed in section 5 to kdenetwork/kpf, ...
    (Securiteam)
  • [kde] Re: A beginning programmer
    ... languages to start trying to help everyone here at KDE ... just automating things better or providing certain workflows in a more ... A patch is often only understandable in the context it applies to, ... Kevin Krammer, KDE developer, xdg-utils developer ...
    (KDE)
  • RE: Updating source code manually
    ... on KDE whilst KDE is running. ... without my PC for that long, and there is no individual port for Kate. ... the patch i've received is about 10 lines of code and the problem that it ... Get advanced junk mail protection with MSN 8. ...
    (freebsd-questions)