CVE-2023-25362

8.8 HIGH

📋 TL;DR

A use-after-free vulnerability in WebKitGTK's WebCore::RenderLayer::repaintBlockSelectionGaps function allows remote attackers to execute arbitrary code by exploiting memory corruption. This affects applications using WebKitGTK for web rendering, potentially leading to complete system compromise. Users of WebKitGTK-based browsers and applications on Linux/Unix systems are primarily affected.

💻 Affected Systems

Products:
  • WebKitGTK
  • Applications using WebKitGTK (Epiphany, GNOME Web, etc.)
Versions: WebKitGTK versions before 2.36.8
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Any application embedding WebKitGTK for web content rendering is vulnerable. This includes various Linux desktop applications and browsers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full system compromise, allowing attackers to install malware, steal data, or create persistent backdoors.

🟠

Likely Case

Remote code execution in the context of the web browser process, enabling data theft, session hijacking, or further network penetration.

🟢

If Mitigated

Limited impact if sandboxing is properly implemented, potentially restricting code execution to browser sandbox boundaries.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious web content that triggers the use-after-free condition. No public exploit code has been confirmed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: WebKitGTK 2.36.8 and later

Vendor Advisory: https://bugs.webkit.org/show_bug.cgi?id=244802

Restart Required: Yes

Instructions:

1. Update WebKitGTK to version 2.36.8 or later using your distribution's package manager. 2. Restart all applications using WebKitGTK. 3. For Gentoo Linux, apply GLSA 202305-32.

🔧 Temporary Workarounds

Disable JavaScript

linux

Disabling JavaScript in WebKitGTK-based browsers prevents exploitation but breaks most web functionality.

Browser-specific settings configuration required

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems from untrusted networks.
  • Use application sandboxing (like Flatpak or Snap) to contain potential exploitation.

🔍 How to Verify

Check if Vulnerable:

Check WebKitGTK version: dpkg -l | grep libwebkit2gtk or rpm -qa | grep webkit2gtk

Check Version:

pkg-config --modversion webkit2gtk-4.0

Verify Fix Applied:

Verify installed version is 2.36.8 or higher using package manager queries.

📡 Detection & Monitoring

Log Indicators:

  • Browser/application crashes with memory access violations
  • Unexpected process termination of WebKitGTK applications

Network Indicators:

  • Unusual outbound connections from browser processes
  • Suspicious web content delivery patterns

SIEM Query:

process_name:"epiphany" OR process_name:"gnome-web" AND event_type:"crash"

🔗 References

📤 Share & Export