An issue was discovered in Bloop Airmail 3 3.5.9 for macOS. It registers and uses the airmail:// URL scheme. The "send" command in the URL scheme allows an external application to send arbitrary emails from an active account without authentication. The handler has no restriction on who can use its functionality. The handler can be invoked using any method that invokes the URL handler such as a hyperlink in an email. The user is not prompted when the handler processes the "send" command, thus leading to automatic transmission of an attacker crafted email from the target account.
References
Link Resource
https://versprite.com/advisories/airmail-3-for-mac/ Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2018-08-21T23:00:00

Updated: 2018-08-21T23:57:01

Reserved: 2018-08-21T00:00:00


Link: CVE-2018-15667

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-08-21T23:29:00.223

Modified: 2020-08-24T17:37:01.140


Link: CVE-2018-15667

JSON object: View

cve-icon Redhat Information

No data.

CWE