KDE KGet Directory Traversal and File Download Vulnerabilities


Description   Two vulnerabilities have been identified in KDE, which could be exploited by attackers to bypass security restrictions and compromise a vulnerable system.
The first issue is caused by an input validation error in KGet when processing the "name" attribute of the "file" element of metalink files, which could be exploited to trick users into downloading files to directories outside of the intended download directory via directory traversal attacks.
The second issue is caused due to KGet automatically starting the download of files without prior user's acknowledgment while displaying a dialog box, which could be exploited to overwrite arbitrary files.
     
Vulnerable Products   Vulnerable Software:
KDE SC versions 4.0.0 through 4.4.3
     
Solution   Apply patches : http://www.kde.org/info/security/advisory-20100513-1.txt
     
CVE   CVE-2010-1511
CVE-2010-1000
     
References   http://www.kde.org/info/security/advisory-20100513-1.txt
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
Directory traversal backward root folder
3.2.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2010-05-14 

 Target Type 
Client 

 Possible exploit 
Local & Remote