When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.
References
Link | Resource |
---|---|
https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/205#note_1494267 | Exploit Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2022-11-18 16:15
Updated : 2022-11-25 19:18
NVD link : CVE-2022-4055
Mitre link : CVE-2022-4055
JSON object : View
CWE
CWE-146
Improper Neutralization of Expression/Command Delimiters
Products Affected
freedesktop
- xdg-utils