[ASA-202005-5] qutebrowser: certificate verification bypass
Arch Linux Security Advisory ASA-202005-5 ========================================= Severity: Low Date : 2020-05-07 CVE-ID : CVE-2020-11054 Package : qutebrowser Type : certificate verification bypass Remote : Yes Link : https://security.archlinux.org/AVG-1152 Summary ======= The package qutebrowser before version 1.11.1-1 is vulnerable to certificate verification bypass. Resolution ========== Upgrade to 1.11.1-1. # pacman -Syu "qutebrowser>=1.11.1-1" The problem has been fixed upstream in version 1.11.1. Workaround ========== * Treat any host with a certificate exception as insecure, ignoring the URL color * Or set content.ssl_strict to True (instead of 'ask'), preventing certificate exceptions in the configuration Description =========== In qutebrowser before version 1.11.1 there is an issue where after a certificate error was overridden by the user, qutebrowser displays the URL as yellow (colors.statusbar.url.warn.fg). However, when the affected website was subsequently loaded again, the URL was mistakenly displayed as green (colors.statusbar.url.success_https). While the user already has seen a certificate error prompt at this point (or set content.ssl_strict to false which is not recommended), this could still provide a false sense of security. Impact ====== The user might think the webpage is secure, when in reality it has an invalid certificate. References ========== https://github.com/qutebrowser/qutebrowser/commit/6821c236f9ae23adf21d46ce0d... https://github.com/qutebrowser/qutebrowser/commit/556fe81b3146e5cd2e77df9d8c... https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-4rcq-jv2... https://security.archlinux.org/CVE-2020-11054
participants (1)
-
Morten Linderud