Cross-site Request Forgery (CSRF) Affecting qutebrowser package, versions [,1.4.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.21% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-QUTEBROWSER-1657080
  • published22 Sept 2021
  • disclosed10 Oct 2018
  • credittoofar

Introduced: 10 Oct 2018

CVE-2018-10895  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

Upgrade qutebrowser to version 1.4.1 or higher.

Overview

qutebrowser is a keyboard-driven, vim-like browser based on PyQt5.

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). This may be exploited to cause websites to access qute://* URLS. Furthermore, a malicious actor could exploit this to load a qute://settings/set URL, which sets editor.command to a bash script, resulting in arbitrary code execution.

CVSS Base Scores

version 3.1