Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 897936 (CVE-2023-26081) - www-client/epiphany: password exfiltration via autofill
Summary: www-client/epiphany: password exfiltration via autofill
Status: CONFIRMED
Alias: CVE-2023-26081
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B4 [upstream/ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-02-26 17:52 UTC by John Helmert III
Modified: 2023-02-26 17:52 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-02-26 17:52:58 UTC
CVE-2023-26081 (https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1275):
https://github.com/google/security-research/security/advisories/GHSA-mhhf-w9xw-pp9x

In Epiphany (aka GNOME Web) through 43.0, untrusted web content can trick users into exfiltrating passwords, because autofill occurs in sandboxed contexts.

Patches at above merge request, don't appear to be in any release.