Описание
When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was deferred |
devel | needs-triage | |
esm-infra/bionic | needs-triage | |
esm-infra/focal | needs-triage | |
esm-infra/xenial | needs-triage | |
focal | ignored | end of standard support, was deferred [2024-06-10] |
jammy | needs-triage | |
kinetic | ignored | end of life, was deferred [2024-06-10] |
lunar | ignored | end of life, was deferred [2024-06-10] |
mantic | ignored | end of life, was deferred [2024-06-10] |
Показывать по
Ссылки на источники
EPSS
7.4 High
CVSS3
Связанные уязвимости
When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.
When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.
When xdg-mail is configured to use thunderbird for mailto URLs, improp ...
When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.
EPSS
7.4 High
CVSS3