[Bug 305169] New: XSS Injection in KAddressbook
Mickaël
mprizee at laposte.net
Tue Aug 14 23:58:13 BST 2012
https://bugs.kde.org/show_bug.cgi?id=305169
Bug ID: 305169
Severity: major
URL: http://www.securem.eu/test.vcf
Version: unspecified
Priority: NOR
CC: tokoe at kde.org
Assignee: kdepim-bugs at kde.org
Summary: XSS Injection in KAddressbook
Classification: Unclassified
OS: Linux
Reporter: mprizee at laposte.net
Hardware: Archlinux Packages
Status: UNCONFIRMED
Component: general
Product: kaddressbook
There is a security hole in the 4.9 version of KAddressBook, more precisely a
XSS Injection is possible through a malicious vcard file, when imported.
Try to import the vcard http://www.securem.eu/test.vcf for example.
Additionally, the label for the TEL field is not displayed on my screen (maybe
a missing French translation ?). What about yours ?
Reproducible: Always
Steps to Reproduce:
1. Download the file http://www.securem.eu/test.vcf
2. Import it into KAddressBook
3. Show the corresponding profile "Mickaël Bergöm"
Actual Results:
HTML code in plaintext fields is evaluated and displayed as it
Expected Results:
The tags <h1> should be escaped and the "<" / ">" characters replaced by HTML
Entities...
Actually this hole will not compromise your computer as Javascript code seems
to be disabled / iframes too, for example.
But it still allows a malicious file displaying wrong things, or directing you
to another website (URL field with a link to a malware website : <a
href="booh.com">good.com</a>)
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the Kdepim-bugs
mailing list