CVE-2012-5624
24.02.2013, 19:55
The XMLHttpRequest object in Qt before 4.8.4 enables http redirection to the file scheme, which allows man-in-the-middle attackers to force the read of arbitrary local files and possibly obtain sensitive information via a file: URL to a QML application.Enginsight
Vendor | Product | Version |
---|---|---|
digia | qt | 𝑥 ≤ 4.8.3 |
qt | qt | 1.41 |
qt | qt | 1.42 |
qt | qt | 1.43 |
qt | qt | 1.44 |
qt | qt | 1.45 |
qt | qt | 2.0.0 |
qt | qt | 2.0.1 |
qt | qt | 2.0.2 |
qt | qt | 3.3.0 |
qt | qt | 3.3.1 |
qt | qt | 3.3.2 |
qt | qt | 3.3.3 |
qt | qt | 3.3.4 |
qt | qt | 3.3.5 |
qt | qt | 3.3.6 |
qt | qt | 4.0.0 |
qt | qt | 4.0.1 |
qt | qt | 4.1.0 |
qt | qt | 4.1.1 |
qt | qt | 4.1.2 |
qt | qt | 4.1.3 |
qt | qt | 4.1.4 |
qt | qt | 4.1.5 |
qt | qt | 4.2.0 |
qt | qt | 4.2.1 |
qt | qt | 4.2.3 |
qt | qt | 4.3.0 |
qt | qt | 4.3.1 |
qt | qt | 4.3.2 |
qt | qt | 4.3.3 |
qt | qt | 4.3.4 |
qt | qt | 4.3.5 |
qt | qt | 4.4.0 |
qt | qt | 4.4.1 |
qt | qt | 4.4.2 |
qt | qt | 4.4.3 |
qt | qt | 4.5.0 |
qt | qt | 4.5.1 |
qt | qt | 4.5.2 |
qt | qt | 4.5.3 |
qt | qt | 4.6.0 |
qt | qt | 4.6.0:rc1 |
qt | qt | 4.6.1 |
qt | qt | 4.6.2 |
qt | qt | 4.6.3 |
qt | qt | 4.6.4 |
qt | qt | 4.6.5 |
qt | qt | 4.6.5:rc |
qt | qt | 4.7.0 |
qt | qt | 4.7.1 |
qt | qt | 4.7.2 |
qt | qt | 4.7.3 |
qt | qt | 4.7.4 |
qt | qt | 4.7.5 |
qt | qt | 4.7.6 |
qt | qt | 4.7.6:rc |
qt | qt | 4.8.0 |
qt | qt | 4.8.1 |
qt | qt | 4.8.2 |
canonical | ubuntu_linux | 10.04 |
canonical | ubuntu_linux | 11.10 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 12.10 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References