Lucene search

K
archlinuxArchLinuxASA-202103-25
HistoryMar 25, 2021 - 12:00 a.m.

[ASA-202103-25] wpewebkit: multiple issues

2021-03-2500:00:00
security.archlinux.org
189

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

83.2%

Arch Linux Security Advisory ASA-202103-25

Severity: High
Date : 2021-03-25
CVE-ID : CVE-2020-27918 CVE-2020-29623 CVE-2021-1765 CVE-2021-1789
CVE-2021-1799 CVE-2021-1801 CVE-2021-1870
Package : wpewebkit
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1722

Summary

The package wpewebkit before version 2.30.6-1 is vulnerable to multiple
issues including arbitrary code execution, access restriction bypass,
information disclosure and sandbox escape.

Resolution

Upgrade to 2.30.6-1.

pacman -Syu “wpewebkit>=2.30.6-1”

The problems have been fixed upstream in version 2.30.6.

Workaround

None.

Description

  • CVE-2020-27918 (arbitrary code execution)

A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. Processing maliciously crafted web content may
lead to arbitrary code execution.

  • CVE-2020-29623 (information disclosure)

A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. “Clear History and Website Data” did not clear
the history in some circumstances.

  • CVE-2021-1765 (sandbox escape)

A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. Maliciously crafted web content may violate
iframe sandboxing policy.

  • CVE-2021-1789 (arbitrary code execution)

A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. Processing maliciously crafted web content may
lead to arbitrary code execution.

  • CVE-2021-1799 (access restriction bypass)

A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. A malicious website may be able to access
restricted ports on arbitrary servers.

  • CVE-2021-1801 (sandbox escape)

A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. Maliciously crafted web content may violate
iframe sandboxing policy.

  • CVE-2021-1870 (arbitrary code execution)

A security issue was discovered in WebKitGTK before 2.30.6 and WPE
WebKit before 2.30.6. A remote attacker may be able to cause arbitrary
code execution. Apple is aware of a report that this issue may have
been actively exploited.

Impact

A remote attacker is able to use maliciously crafted web content to
execute arbitrary code or violate the iframe policy. A malicious server
could access restricted ports.

References

https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2020-27918
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2020-29623
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1765
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1789
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1799
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1801
https://webkitgtk.org/security/WSA-2021-0002.html#CVE-2021-1870
https://security.archlinux.org/CVE-2020-27918
https://security.archlinux.org/CVE-2020-29623
https://security.archlinux.org/CVE-2021-1765
https://security.archlinux.org/CVE-2021-1789
https://security.archlinux.org/CVE-2021-1799
https://security.archlinux.org/CVE-2021-1801
https://security.archlinux.org/CVE-2021-1870

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanywpewebkit< 2.30.6-1UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

83.2%