Vulnerability Name:

CVE-2018-6790 (CCN-138839)

Assigned:2018-01-31
Published:2018-01-31
Updated:2019-08-06
Summary:An issue was discovered in KDE Plasma Workspace before 5.12.0. dataengines/notifications/notificationsengine.cpp allows remote attackers to discover client IP addresses via a URL in a notification, as demonstrated by the src attribute of an IMG element.
CVSS v3 Severity:5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
4.3 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)
3.8 Low (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
CWE-20
CWE-200
CWE-200
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2018-6790

Source: REDHAT
Type: UNKNOWN
RHSA-2019:2141

Source: CCN
Type: KDE Plasma GIT Repository
Sanitise notification HTML

Source: CONFIRM
Type: Vendor Advisory
https://cgit.kde.org/plasma-workspace.git/commit/?id=5bc696b5abcdb460c1017592e80b2d7f6ed3107c

Source: CONFIRM
Type: Vendor Advisory
https://cgit.kde.org/plasma-workspace.git/commit/?id=8164beac15ea34ec0d1564f0557fe3e742bdd938

Source: XF
Type: UNKNOWN
kde-cve20186790-info-disc(138839)

Source: CONFIRM
Type: Issue Tracking, Vendor Advisory
https://phabricator.kde.org/D10188

Source: CONFIRM
Type: Vendor Advisory
https://www.kde.org/announcements/plasma-5.11.5-5.12.0-changelog.php

Vulnerable Configuration:Configuration 1:
  • cpe:/a:kde:plasma-workspace:*:*:*:*:*:*:*:* (Version < 5.12.0)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20186790
    V
    CVE-2018-6790
    2021-10-24
    oval:org.opensuse.security:def:25578
    P
    Security update for python-ipaddress (Important)
    2020-12-01
    oval:org.opensuse.security:def:24962
    P
    Security update for glibc (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:26362
    P
    Security update for nginx (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25291
    P
    Security update for MozillaFirefox (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25666
    P
    Security update for java-1_8_0-openjdk (Important)
    2020-12-01
    oval:org.opensuse.security:def:25026
    P
    Security update for MozillaFirefox (Important)
    2020-12-01
    oval:org.opensuse.security:def:26397
    P
    Security update for plasma5-workspace (Important)
    2020-12-01
    oval:org.opensuse.security:def:25375
    P
    Security update for webkit2gtk3 (Important)
    2020-12-01
    oval:org.opensuse.security:def:25680
    P
    Security update for krb5 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:25153
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:25525
    P
    Security update for ruby2.1 (Important)
    2020-12-01
    oval:org.opensuse.security:def:24951
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:25724
    P
    Security update for postgresql10 (Low)
    2020-12-01
    oval:org.opensuse.security:def:25234
    P
    Security update for dnsmasq (Moderate)
    2020-12-01
    oval:com.redhat.rhsa:def:20192141
    P
    RHSA-2019:2141: kde-workspace security and bug fix update (Low)
    2019-08-06
    oval:com.ubuntu.xenial:def:201867900000000
    V
    CVE-2018-6790 on Ubuntu 16.04 LTS (xenial) - low.
    2018-02-07
    oval:com.ubuntu.artful:def:20186790000
    V
    CVE-2018-6790 on Ubuntu 17.10 (artful) - low.
    2018-02-06
    oval:com.ubuntu.trusty:def:20186790000
    V
    CVE-2018-6790 on Ubuntu 14.04 LTS (trusty) - low.
    2018-02-06
    oval:com.ubuntu.xenial:def:20186790000
    V
    CVE-2018-6790 on Ubuntu 16.04 LTS (xenial) - low.
    2018-02-06
    BACK
    kde plasma-workspace *