Vulnerabilities > CVE-2023-26081 - Exposure of Resource to Wrong Sphere vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
In Epiphany (aka GNOME Web) through 43.0, untrusted web content can trick users into exfiltrating passwords, because autofill occurs in sandboxed contexts.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://github.com/google/security-research/security/advisories/GHSA-mhhf-w9xw-pp9x
- https://github.com/google/security-research/security/advisories/GHSA-mhhf-w9xw-pp9x
- https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1275
- https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1275
- https://lists.debian.org/debian-lts-announce/2023/05/msg00015.html
- https://lists.debian.org/debian-lts-announce/2023/05/msg00015.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFWUNG6E4ZT43EYNHKYXS7QVSO2VW2H2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFWUNG6E4ZT43EYNHKYXS7QVSO2VW2H2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SADQCSQKTJKTTIJMEPY7GII6IVQSKEKV/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SADQCSQKTJKTTIJMEPY7GII6IVQSKEKV/