Cross-site Request Forgery (CSRF) Affecting qt4-x11 package, versions <4:4.6.2-4


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.22% (61st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN10-QT4X11-406688
  • published13 Nov 2009
  • disclosed13 Nov 2009

Introduced: 13 Nov 2009

CVE-2009-2816  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

Upgrade Debian:10 qt4-x11 to version 4:4.6.2-4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream qt4-x11 package and not the qt4-x11 package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

The implementation of Cross-Origin Resource Sharing (CORS) in WebKit, as used in Apple Safari before 4.0.4 and Google Chrome before 3.0.195.33, includes certain custom HTTP headers in the OPTIONS request during cross-origin operations with preflight, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web page.

CVSS Scores

version 3.1