CVE-2014-8600
IO Slaves KDE Insufficient Input Validation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Multiple cross-site scripting (XSS) vulnerabilities in KDE-Runtime 4.14.3 and earlier, kwebkitpart 1.3.4 and earlier, and kio-extras 5.1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via a crafted URI using the (1) zip, (2) trash, (3) tar, (4) thumbnail, (5) smtps, (6) smtp, (7) smb, (8) remote, (9) recentdocuments, (10) nntps, (11) nntp, (12) network, (13) mbox, (14) ldaps, (15) ldap, (16) fonts, (17) file, (18) desktop, (19) cgi, (20) bookmarks, or (21) ar scheme, which is not properly handled in an error message.
MĂșltiples vulnerabilidades de XSS en KDE-Runtime 4.14.3 y anteriores, kwebkitpart 1.3.4 y anteriores, y kio-extras 5.1.1 y anteriores permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a travĂ©s de una URI maniplada que utiliza la esquema (1) zip, (2) trash, (3) tar, (4) thumbnail, (5) smtps, (6) smtp, (7) smb, (8) remote, (9) recentdocuments, (10) nntps, (11) nntp, (12) network, (13) mbox, (14) ldaps, (15) ldap, (16) fonts, (17) file, (18) desktop, (19) cgi, (20) bookmarks, or (21) ar, lo que no se maneja correctamente en un mensaje de error.
It was discovered that a number of the protocol handlers (referred to as IO slaves) did not satisfactorily handle malicious input. It is possible for an attacker to inject JavaScript by manipulating IO slave URI such that the JavaScript from the manipulated request is returned in the response.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-11-04 CVE Reserved
- 2014-11-19 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/71190 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://seclists.org/fulldisclosure/2014/Nov/54 | 2024-08-06 | |
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-8600 | 2024-08-06 |
URL | Date | SRC |
---|---|---|
http://ubuntu.com/usn/usn-2414-1 | 2018-10-30 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html | 2018-10-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Urs Wolfer Search vendor "Urs Wolfer" | Kwebkitpart Search vendor "Urs Wolfer" for product "Kwebkitpart" | <= 1.3.3 Search vendor "Urs Wolfer" for product "Kwebkitpart" and version " <= 1.3.3" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kde-runtime Search vendor "Kde" for product "Kde-runtime" | <= 4.14.2 Search vendor "Kde" for product "Kde-runtime" and version " <= 4.14.2" | - |
Affected
| ||||||
Kde Search vendor "Kde" | Kio-extras Search vendor "Kde" for product "Kio-extras" | <= 5.1.1 Search vendor "Kde" for product "Kio-extras" and version " <= 5.1.1" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 13.1 Search vendor "Opensuse" for product "Opensuse" and version "13.1" | - |
Affected
|