CVE-2019-6251

WebKitGTK and WPE WebKit prior to version 2.24.1 are vulnerable to address bar spoofing upon certain JavaScript redirections. An attacker could cause malicious web content to be displayed as if for a trusted URI. This is similar to the CVE-2018-8383 issue in Microsoft Edge.
References
Link Resource
https://gitlab.gnome.org/GNOME/epiphany/issues/532 Exploit Patch Third Party Advisory
https://seclists.org/bugtraq/2019/Apr/21 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/04/11/1 Mailing List Third Party Advisory
http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html Third Party Advisory VDB Entry
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/ Mailing List Release Notes Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNPI3R6QWDJBA5KNGA6QSMKYLY5RRHBZ/ Mailing List Release Notes Third Party Advisory
https://usn.ubuntu.com/3948-1/ Third Party Advisory
https://trac.webkit.org/changeset/243434 Patch Vendor Advisory
https://bugs.webkit.org/show_bug.cgi?id=194208 Issue Tracking Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LACVFU4MYYRPJ3IEA4UCN5KUEAGCCJ72/ Mailing List Release Notes Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UO3DIA54X7FOUWFZW5YXC2MZ6KNHG6SW/ Mailing List Release Notes Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSCDI3635E37GL4BNJDRDT2KEUBDLGSO/ Mailing List Release Notes Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html Third Party Advisory
https://security.gentoo.org/glsa/201909-05
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*
cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

Information

Published : 2019-01-14 00:29

Updated : 2020-08-24 10:37


NVD link : CVE-2019-6251

Mitre link : CVE-2019-6251


JSON object : View

Advertisement

dedicated server usa

Products Affected

webkitgtk

  • webkitgtk

fedoraproject

  • fedora

canonical

  • ubuntu_linux

opensuse

  • leap

gnome

  • epiphany

wpewebkit

  • wpe_webkit