Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-4055

Опубликовано: 19 нояб. 2022
Источник: debian

Описание

When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xdg-utilsunfixedpackage
xdg-utilspostponedtrixiepackage
xdg-utilspostponedbookwormpackage
xdg-utilsno-dsabullseyepackage
xdg-utilsno-dsabusterpackage

Примечания

  • https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/205#note_1494267

  • https://gitlab.freedesktop.org/xdg/xdg-utils/-/merge_requests/58

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 2 лет назад

When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.

CVSS3: 7.4
redhat
почти 3 года назад

When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.

CVSS3: 7.4
nvd
больше 2 лет назад

When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.

CVSS3: 7.4
msrc
4 месяца назад

Описание отсутствует

CVSS3: 7.4
github
больше 2 лет назад

When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.