Mitigation of the WebP 0-day vulnerability CVE-2023-4863 in QF-Test

Last updated 10/11/2023, 10:30 AM.

We are aware of the recently disclosed critical vulnerability in the libwebp library (CVE-2023-4863), potentially enabling remote code execution through a specially crafted WebP image file.

If QF-Test is used for opening files from untrusted sources, QF-Test versions from 4.5.0 to (including) 7.0.5 are vulnerable to this exploit through maliciously modified run logs or test suites.

Today we released QF-Test 7.0.6 which fixes this vulnerability. We advise all our users to update to the latest version.

If you are unable to update to QF-Test 7.0.6 and need to open untrusted run logs or test suites with QF-Test 7.0.5 or older, you can secure that installation of QF-Test against this vulnerability with the following steps:

  1. Open the QF-Test system directory of the QF-Test installation.

To do this, start QF-Test, select “Help” – “About” from the QF-Test menu bar (on macOS “QF-Test” – “About QF-Test”), switch to the “System Info” tab and click the link next to dir.version. 2. Quit all running instances of QF-Test. 3. Navigate to the subdirectory bin of the QF-Test system directory. 4. Delete the directory webp from the bin subdirectory. 5. Download the updated WebP library and extract the included webp directory: Updated WebP library. 6. Copy the extracted webp directory to the bin directory.

You may need administrator privileges to perform this update.

Update 10/11/2023:

In the meantime, the embedded Chrome browser for QF-Driver on Windows has also been updated with QF-Test 7.0.7.

Besides, the Electron demos have been updated. These are downloaded automatically by the Electron demo test suites. If you want to be on the safe side, delete possibly existing old demos from the directory electron in the cache directory of QF-Test. This can be found similar to point 1 via the link dir.cache.

We use "Matomo" cookies to anonymously evaluate your visit to our website. For this we need your consent, which is valid for twelve months.

Cookie Configuration

Functional cookies

We use functional cookies to ensure the basic functionality of the website.

Performance and statistics cookies

We use Matomo for analyzing and optimizing our website. Cookies permit an anonymous collection of information that help us offering you a clear and user-friendly visit of our web pages.

Cookie details
Description Vendor Lifetime Type Purpose
_pk_id Matomo 13 Months HTTP Contains a unique, pseudonymized visitor ID internal to Matomo for recognizing returning visitors.
_pk_ref Matomo 6 Months HTTP Used to track from which website the anonymized user proceeded to our website.
_pk_ses Matomo 1 Day HTTP The Matomo session cookie is used to track the visitor's page requests during the session.
_pk_testcookie Matomo Session HTTP Used to check whether the visitor's browser supports cookies.
_pk_cvar Matomo 30 Minutes HTTP Temporarily store data about the visit.
_pk_hsr Matomo 30 Minutes HTTP Temporarily store data about the visit.