{"id":"CVE-2017-6410","details":"kpac/script.cpp in KDE kio before 5.32 and kdelibs before 4.14.30 calls the PAC FindProxyForURL function with a full https URL (potentially including Basic Authentication credentials, a query string, or PATH_INFO), which allows remote attackers to obtain sensitive information via a crafted PAC file.","modified":"2026-03-14T09:23:39.599605Z","published":"2017-03-02T06:59:01.183Z","related":["MGASA-2017-0079","openSUSE-SU-2017:0677-1","openSUSE-SU-2017:0680-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/96515"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3849"},{"type":"FIX","url":"https://www.kde.org/info/security/advisory-20170228-1.txt"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kde/kdelibs","events":[{"introduced":"0"},{"last_affected":"f635d3b2347b400b74f199f1904a5129def28890"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.14.29"}]}},{"type":"GIT","repo":"https://github.com/kde/kio","events":[{"introduced":"0"},{"last_affected":"0996491501b66ea0853ce4f2d42f15a44db38528"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.31"}]}}],"versions":["KDE/4.8.97","v3.4.0-beta1","v3.4.0-beta2","v3.80.2","v3.80.3","v3.91","v3.92","v3.95","v3.96","v3.97","v4.0.0","v4.0.1","v4.0.2","v4.0.3","v4.0.71","v4.0.80","v4.0.83","v4.1.96","v4.10.0","v4.10.1","v4.10.2","v4.10.3","v4.10.4","v4.10.5","v4.10.80","v4.10.90","v4.10.95","v4.10.97","v4.11.0","v4.11.1","v4.11.2","v4.11.3","v4.11.4","v4.11.5","v4.11.80","v4.11.90","v4.11.95","v4.11.97","v4.12.0","v4.12.1","v4.12.2","v4.12.3","v4.12.4","v4.12.5","v4.12.80","v4.12.90","v4.12.95","v4.12.97","v4.13.0","v4.13.1","v4.13.2","v4.13.3","v4.13.80","v4.13.90","v4.13.95","v4.13.97","v4.14.0","v4.14.1","v4.14.10","v4.14.11","v4.14.12","v4.14.13","v4.14.14","v4.14.15","v4.14.16","v4.14.17","v4.14.18","v4.14.19","v4.14.2","v4.14.20","v4.14.21","v4.14.22","v4.14.23","v4.14.24","v4.14.25","v4.14.26","v4.14.27","v4.14.28","v4.14.29","v4.14.3","v4.14.4","v4.14.5","v4.14.6","v4.14.7","v4.14.8","v4.14.9","v4.2.95","v4.2.96","v4.3.95","v4.3.98","v4.4.1","v4.4.80","v4.4.85","v4.6.90","v4.6.95","v4.7.0","v4.7.1","v4.7.2","v4.7.3","v4.7.4","v4.7.95","v4.7.97","v4.8.0","v4.8.1","v4.8.2","v4.8.3","v4.8.4","v4.8.80","v4.8.90","v4.8.95","v4.8.97","v4.9.0","v4.9.1","v4.9.2","v4.9.3","v4.9.4","v4.9.80","v4.9.90","v4.9.95","v4.9.97","v4.9.98"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-6410.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}]}