When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.
References
Link | Resource |
---|---|
https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/205#note_1494267 | Exploit Issue Tracking Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2022-11-18T00:00:00
Updated: 2022-11-18T00:00:00
Reserved: 2022-11-17T00:00:00
Link: CVE-2022-4055
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-11-19T00:15:31.003
Modified: 2022-11-26T03:18:55.043
Link: CVE-2022-4055
JSON object: View
Redhat Information
No data.
CWE