CVE-2019-6251

WebKitGTK and WPE WebKit prior to version 2.24.1 are vulnerable to address bar spoofing upon certain JavaScript redirections. An attacker could cause malicious web content to be displayed as if for a trusted URI. This is similar to the CVE-2018-8383 issue in Microsoft Edge.
References
Link Resource
https://gitlab.gnome.org/GNOME/epiphany/issues/532 Exploit Patch Third Party Advisory
https://seclists.org/bugtraq/2019/Apr/21 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/04/11/1 Mailing List Third Party Advisory
http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html Third Party Advisory VDB Entry
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/ Mailing List Release Notes Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNPI3R6QWDJBA5KNGA6QSMKYLY5RRHBZ/ Mailing List Release Notes Third Party Advisory
https://usn.ubuntu.com/3948-1/ Third Party Advisory
https://trac.webkit.org/changeset/243434 Patch Vendor Advisory
https://bugs.webkit.org/show_bug.cgi?id=194208 Issue Tracking Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LACVFU4MYYRPJ3IEA4UCN5KUEAGCCJ72/ Mailing List Release Notes Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UO3DIA54X7FOUWFZW5YXC2MZ6KNHG6SW/ Mailing List Release Notes Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSCDI3635E37GL4BNJDRDT2KEUBDLGSO/ Mailing List Release Notes Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html Third Party Advisory
https://security.gentoo.org/glsa/201909-05
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*
cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

Information

Published : 2019-01-14 08:29

Updated : 2020-08-24 17:37


NVD link : CVE-2019-6251

Mitre link : CVE-2019-6251


JSON object : View

Products Affected

canonical

  • ubuntu_linux

fedoraproject

  • fedora

gnome

  • epiphany

opensuse

  • leap

webkitgtk

  • webkitgtk

wpewebkit

  • wpe_webkit