Description
qutebrowser before version 1.4.1 is vulnerable to a cross-site request forgery flaw that allows websites to access 'qute://*' URLs. A malicious website could exploit this to load a 'qute://settings/set' URL, which then sets 'editor.command' to a bash script, resulting in arbitrary code execution.
References (3)
Core 3
Core References
Patch, Third Party Advisory x_refsource_confirm
https://github.com/qutebrowser/qutebrowser/commit/43e58ac865ff862c2008c510fc5f7627e10b4660
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10895
Mailing List, Mitigation, Patch, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2018/07/11/7
Scores
CVSS v3
9.3
EPSS
0.0017
EPSS Percentile
37.6%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Details
CWE
CWE-352
Status
published
Products (2)
pypi/qutebrowser
0 - 1.4.1PyPI
qutebrowser/qutebrowser
< 1.4.1
Published
Jul 12, 2018
Tracked Since
Feb 18, 2026