summaryrefslogtreecommitdiff
path: root/misc
AgeCommit message (Collapse)Author
2022-01-12Don't install PyYAML from git for bleeding CIFlorian Bruhin
Workaround for https://github.com/yaml/pyyaml/issues/601
2022-01-10Update dependenciesqutebrowser bot
2022-01-09Merge remote-tracking branch 'origin/pr/6932'Florian Bruhin
2022-01-04Use flake8-pytest-stylepytest-styleFlorian Bruhin
2022-01-03requirements: Python 3.6 for zippFlorian Bruhin
2022-01-03Update dependenciesqutebrowser bot
2022-01-02qute-bitwarden: let the user specify their password promptEric Engestrom
This allows it to work on Wayland (my use case), but also opens up the possibility of using the system keychain to manage the password, or any other method the user might want.
2021-12-29requirements: More Python 3.6 stuffFlorian Bruhin
2021-12-27Update dependenciesqutebrowser bot
2021-12-20requirements: Do the Python 3.6 danceFlorian Bruhin
2021-12-20Update dependenciesqutebrowser bot
2021-12-13Update dependenciesqutebrowser bot
2021-12-06Update dependenciesqutebrowser bot
2021-12-03Merge branch 'packaging-update'Florian Bruhin
# Conflicts: # misc/requirements/requirements-dev.txt
2021-12-03Update dependenciesqutebrowser bot
2021-12-03scripts: Handle packaging dependencies via toxFlorian Bruhin
2021-12-02requirements: Upgrade to pylint 2.12Florian Bruhin
We pinned pylint to < 2.5 due to this issue: https://github.com/PyCQA/astroid/issues/772 ...but then for some reaosn never unpinned it after the issue was fixed.
2021-11-29Update dependenciesqutebrowser bot
2021-11-22Update dependenciesqutebrowser bot
2021-11-15Update dependenciesqutebrowser bot
2021-11-08password_fill: Fix quoting for variable expansionsFlorian Bruhin
See https://github.com/koalaman/shellcheck/wiki/SC2295
2021-11-08Update dependenciesqutebrowser bot
2021-11-01Update dependenciesqutebrowser bot
2021-10-30Avoid pytest-bdd 5 for nowFlorian Bruhin
See https://github.com/pytest-dev/pytest-bdd/issues/447
2021-10-25Update dependenciesqutebrowser bot
2021-10-21Release v2.4.0v2.4.0Florian Bruhin
2021-10-21Update dependenciesqutebrowser bot
2021-10-21requirements: PyQt 5.15.5Florian Bruhin
2021-10-21tox: Use newest PyQt for pyinstallerFlorian Bruhin
See #6611
2021-10-21Merge remote-tracking branch 'origin/update-dependencies'Florian Bruhin
2021-10-21Don't register qutebrowserurl: as URL protocolFlorian Bruhin
This was originally intended as a fix for CVE-2021-41146, but it turned out the same exploit works via e.g. https:// just as well. Still, it makes sense to remove it.
2021-10-21CVE-2021-41146: Add --untrusted-args to avoid argument injectionFlorian Bruhin
On Windows, if an application is registered as an URL handler like this: HKEY_CLASSES_ROOT https URL Protocol = "" [...] shell open command (Default) = ".../qutebrowser.exe" "%1" one would think that Windows takes care of making sure URLs can't inject arguments by containing a quote. However, this is not the case, as stated by the Microsoft docs: https://docs.microsoft.com/en-us/previous-versions/windows/internet-explorer/ie-developer/platform-apis/aa767914(v=vs.85) Security Warning: Applications that handle URI schemes must consider how to respond to malicious data. Because handler applications can receive data from untrusted sources, the URI and other parameter values passed to the application may contain malicious data that attempts to exploit the handling application. and As noted above, the string that is passed to a pluggable protocol handler might be broken across multiple parameters. Malicious parties could use additional quote or backslash characters to pass additional command line parameters. For this reason, pluggable protocol handlers should assume that any parameters on the command line could come from malicious parties, and carefully validate them. Applications that could initiate dangerous actions based on external data must first confirm those actions with the user. In addition, handling applications should be tested with URIs that are overly long or contain unexpected (or undesirable) character sequences. Indeed it's trivial to pass a command to qutebrowser this way - given how trivial the exploit is to recreate given the information above, here's a PoC: https:x" ":spawn calc (or qutebrowserurl: instead of https: if qutebrowser isn't registered as a default browser) Some applications do escape the quote characters before calling qutebrowser - but others, like Outlook Desktop or .url files, do not. As a fix, we add an --untrusted-args flag and some early validation of the raw sys.argv, before parsing any arguments or e.g. creating a QApplication (which might already allow injecting Qt flags there). We assume that there's no way for an attacker to inject flags *before* the %1 placeholder in the registry, and add --untrusted-args as the last argument of the registry entry. This way, it'd still be possible for users to customize their invocation flags without having to remove --untrusted-args. After --untrusted-args, however, we have some rather strict checks: - There should be zero or one arguments, but not two (or more) - Any argument may not start with - (flag) or : (qutebrowser command) We also add the --untrusted-args flag to the Linux .desktop file, though it should not be needed there, as the specification there is sane: https://specifications.freedesktop.org/desktop-entry-spec/desktop-entry-spec-latest.html#exec-variables Implementations must take care not to expand field codes into multiple arguments unless explicitly instructed by this specification. This means that name fields, filenames and other replacements that can contain spaces must be passed as a single argument to the executable program after expansion. There is no comparable mechanism on macOS, which opens the application without arguments and then sends an "open" event to it: https://doc.qt.io/qt-5/qfileopenevent.html This issue was introduced in qutebrowser v1.7.0 which started registering it as URL handler: baee2888907b260881d5831c68500941937261a0 / #4086 This is by no means an issue isolated to qutebrowser. Many other projects have had similar trouble with Windows' rather unexpected behavior: Electron / Exodus Bitcoin wallet: - http://web.archive.org/web/20190702112128/https://medium.com/0xcc/electrons-bug-shellexecute-to-blame-cacb433d0d62 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000006 - https://medium.com/hackernoon/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374 IE/Firefox: - https://bugzilla.mozilla.org/show_bug.cgi?id=384384 - https://bugzilla.mozilla.org/show_bug.cgi?id=1572838 Others: - http://web.archive.org/web/20210930203632/https://www.vdoo.com/blog/exploiting-custom-protocol-handlers-in-windows - https://parsiya.net/blog/2021-03-17-attack-surface-analysis-part-2-custom-protocol-handlers/ - etc. etc. See CVE-2021-41146 / GHSA-vw27-fwjf-5qxm: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41146 https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-vw27-fwjf-5qxm Thanks to Ping Fan (Zetta) Ke of Valkyrie-X Security Research Group (VXRL/@vxresearch) for finding and responsibly disclosing this issue.
2021-10-18Update dependenciesqutebrowser bot
2021-10-11Update dependenciesqutebrowser bot
2021-10-04Update dependenciesqutebrowser bot
2021-10-01requirements: Revert to pytest-bdd release for bleedingFlorian Bruhin
See https://github.com/pytest-dev/pytest-bdd/issues/447
2021-09-29Add userscript bitwarden-rofiAdrián Lattes
2021-09-27Fix a couple of minor mistakesmhmdanas
2021-09-27Update dependenciesqutebrowser bot
2021-09-20Update dependenciesqutebrowser bot
2021-09-20Revert "requirements: Use older pluggy"Florian Bruhin
This reverts commit 41febf947555ce2e91790c8dc1e4f4c222b00952. diff_cover now requires pluggy >=1.0.0.
2021-09-13Update dependenciesqutebrowser bot
2021-09-13requirements: Test --use-feature=in-tree-buildFlorian Bruhin
2021-09-13requirements: Use older pluggyFlorian Bruhin
See https://github.com/Bachmann1234/diff_cover/issues/249
2021-09-04Fix paths for scripts/dev/gen_resources.pyFlorian Bruhin
2021-08-30Update dependenciesqutebrowser bot
2021-08-23Update dependenciesqutebrowser bot
2021-08-21Merge remote-tracking branch 'origin/pr/6633'Florian Bruhin
2021-08-21Merge remote-tracking branch 'origin/pr/6634'Florian Bruhin
2021-08-18Optionally provide unfiltered selection of secretsAndré Keller
Add an option to show all secrets, whether they match the current url or not.