Rapid7 Vulnerability & Exploit Database

CESA-2004:074: kdelibs security update

Back to Search

CESA-2004:074: kdelibs security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
04/15/2004
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated kdelibs packages that fix a flaw in cookie path handling are now available.

Konqueror is a file manager and Web browser for the K Desktop Environment (KDE). Flaws have been found in the cookie path handling between a number of Web browsers and servers. The HTTP cookie standard allows a Web server supplying a cookie to a client to specify a subset of URLs on the origin server to which the cookie applies. Web servers such as Apache do not filter returned cookies and assume that the client will only send back cookies for requests that fall within the server-supplied subset of URLs. However, by supplying URLs that use path traversal (/../) and character encoding, it is possible to fool many browsers into sending a cookie to a path outside of the originally-specified subset. KDE version 3.1.3 and later include a patch to Konquerer that disables the sending of cookies to the server if the URL contains such encoded traversals. CentOS Linux 2.1 shipped with KDE 2.2.2 and is therefore vulnerable to this issue. Users of Konquerer are advised to upgrade to these erratum packages, which contain a backported patch for this issue.

Solution(s)

  • centos-upgrade-arts
  • centos-upgrade-kdelibs
  • centos-upgrade-kdelibs-devel
  • centos-upgrade-kdelibs-sound
  • centos-upgrade-kdelibs-sound-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;