CVE-2021-41146

Published on: 10/21/2021 12:00:00 AM UTC

Last Modified on: 10/28/2021 12:10:00 AM UTC

CVE-2021-41146 - advisory for GHSA-vw27-fwjf-5qxm

Source: Mitre Source: Nist Print: PDF PDF
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Certain versions of Qutebrowser from Qutebrowser contain the following vulnerability:

qutebrowser is an open source keyboard-focused browser with a minimal GUI. Starting with qutebrowser v1.7.0, the Windows installer for qutebrowser registers a `qutebrowserurl:` URL handler. With certain applications, opening a specially crafted `qutebrowserurl:...` URL can lead to execution of qutebrowser commands, which in turn allows arbitrary code execution via commands such as `:spawn` or `:debug-pyeval`. Only Windows installs where qutebrowser is registered as URL handler are affected. The issue has been fixed in qutebrowser v2.4.0. The fix also adds additional hardening for potential similar issues on Linux (by adding the new --untrusted-args flag to the .desktop file), though no such vulnerabilities are known.

  • CVE-2021-41146 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.
  • Affected Vendor/Software: URL Logo qutebrowser - qutebrowser version >= 1.7.0, < 2.4.0

CVSS3 Score: 8.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.8 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
CVE-2021-41146: Add --untrusted-args to avoid argument injection · qutebrowser/[email protected] · GitHub github.com
text/html
URL Logo MISC github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430
Arbitrary command execution in qutebrowser on Windows via URL handler · Advisory · qutebrowser/qutebrowser · GitHub github.com
text/html
URL Logo CONFIRM github.com/qutebrowser/qutebrowser/security/advisories/GHSA-vw27-fwjf-5qxm

Related QID Numbers

  • 980274 Python (pip) Security Update for qutebrowser (GHSA-vw27-fwjf-5qxm)

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationQutebrowserQutebrowserAllAllAllAll
ApplicationQutebrowserQutebrowserAllAllAllAll
  • cpe:2.3:a:qutebrowser:qutebrowser:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:qutebrowser:qutebrowser:*:*:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @CVEreport CVE-2021-41146 : qutebrowser is an open source keyboard-focused browser with a minimal GUI. Starting with qutebrows… twitter.com/i/web/status/1… 2021-10-21 17:41:05
Twitter Icon @Robo_Alerts Potentially Critical CVE Detected! CVE-2021-41146 Description: qutebrowser is an open source keyboard-focused brows… twitter.com/i/web/status/1… 2021-10-21 19:00:11
Twitter Icon @sarang143u qutebrowser development blog: CVE-2021-41146: Arbitrary command execution in qutebrowser on Windows via URL handler blog.qutebrowser.org/cve-2021-41146… 2021-10-21 20:01:29
Reddit Logo Icon /r/qutebrowser v2.4.0 released: Critical RCE fix on Windows (CVE-2021-41146), plus small features/fixes 2021-10-21 17:23:19
© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report