Vulnerability Name: | CVE-2012-5624 (CCN-80552) |
Assigned: | 2012-12-04 |
Published: | 2012-12-04 |
Updated: | 2021-06-16 |
Summary: | The XMLHttpRequest object in Qt before 4.8.4 enables http redirection to the file scheme, which allows man-in-the-middle attackers to force the read of arbitrary local files and possibly obtain sensitive information via a file: URL to a QML application.
|
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): None Availibility (A): None |
|
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N) 3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None | 4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N) 3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None |
|
Vulnerability Type: | CWE-200
|
Vulnerability Consequences: | Obtain Information |
References: | Source: MITRE Type: CNA CVE-2012-5624
Source: SUSE Type: UNKNOWN openSUSE-SU-2013:0143
Source: SUSE Type: UNKNOWN openSUSE-SU-2013:0154
Source: SUSE Type: UNKNOWN openSUSE-SU-2013:0157
Source: MLIST Type: UNKNOWN [Announce] 20121130 Qt Project Security Advisory: QML XmlHttpRequest Insecure Redirection
Source: CONFIRM Type: UNKNOWN http://qt.gitorious.org/qt/qt/commit/96311def2466dd44de64d77a1c815b22fbf68f71
Source: CCN Type: Qt Web site Qt
Source: CCN Type: SA51655 Qt XmlHttpRequest Local File Information Disclosure Vulnerability
Source: SECUNIA Type: Vendor Advisory 52217
Source: MLIST Type: UNKNOWN [oss-security] 20121204 Re: CVE Request -- Qt (x < 4.8.4): QML XmlHttpRequest insecure redirection
Source: CCN Type: BID-56807 Qt 'XmlHttpRequest' Object Insecure Redirection Information Disclosure Vulnerability
Source: UBUNTU Type: UNKNOWN USN-1723-1
Source: MISC Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=883415
Source: CCN Type: Red Hat Bugzilla Bug 883457 CVE-2012-5624 Qt: QML XmlHttpRequest insecure redirection
Source: CONFIRM Type: UNKNOWN https://codereview.qt-project.org/#change,40034
Source: XF Type: UNKNOWN qt-xmlhttprequest-info-disc(80552)
|
Vulnerable Configuration: | Configuration 1: cpe:/a:qt:qt:4.7.0:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.7.2:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.6.3:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.6.1:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.5.0:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.4.0:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.3.2:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.3.0:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.1.3:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.1.1:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.7.5:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.7.6:rc:*:*:*:*:*:*OR cpe:/a:qt:qt:4.6.5:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.6.0:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.4.2:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.4.3:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.3.4:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.3.5:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.0.0:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.0.1:*:*:*:*:*:*:*OR cpe:/a:qt:qt:3.3.1:*:*:*:*:*:*:*OR cpe:/a:qt:qt:3.3.2:*:*:*:*:*:*:*OR cpe:/a:qt:qt:3.3.3:*:*:*:*:*:*:*OR cpe:/a:qt:qt:3.3.0:*:*:*:*:*:*:*OR cpe:/a:qt:qt:1.43:*:*:*:*:*:*:*OR cpe:/a:qt:qt:1.45:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.8.2:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.8.1:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.8.0:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.7.6:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.6.2:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.6.5:rc:*:*:*:*:*:*OR cpe:/a:qt:qt:4.5.2:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.5.3:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.2.3:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.2.1:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.1.5:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.1.0:*:*:*:*:*:*:*OR cpe:/a:qt:qt:3.3.5:*:*:*:*:*:*:*OR cpe:/a:qt:qt:2.0.1:*:*:*:*:*:*:*OR cpe:/a:qt:qt:2.0.2:*:*:*:*:*:*:*OR cpe:/a:qt:qt:2.0.0:*:*:*:*:*:*:*OR cpe:/a:digia:qt:*:*:*:*:*:*:*:* (Version <= 4.8.3)OR cpe:/a:qt:qt:4.7.1:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.7.3:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.7.4:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.6.0:rc1:*:*:*:*:*:*OR cpe:/a:qt:qt:4.6.4:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.5.1:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.4.1:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.3.3:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.3.1:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.2.0:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.1.4:*:*:*:*:*:*:*OR cpe:/a:qt:qt:4.1.2:*:*:*:*:*:*:*OR cpe:/a:qt:qt:3.3.4:*:*:*:*:*:*:*OR cpe:/a:qt:qt:3.3.6:*:*:*:*:*:*:*OR cpe:/a:qt:qt:1.42:*:*:*:*:*:*:*OR cpe:/a:qt:qt:1.44:*:*:*:*:*:*:*OR cpe:/a:qt:qt:1.41:*:*:*:*:*:*:* Configuration 2: cpe:/o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*OR cpe:/o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*OR cpe:/o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*OR cpe:/o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |