ID CVE-2022-4055
Summary When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.
References
Vulnerable Configurations
  • cpe:2.3:a:freedesktop:xdg-utils:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:freedesktop:xdg-utils:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:freedesktop:xdg-utils:1.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:freedesktop:xdg-utils:1.1.0:-:*:*:*:*:*:*
  • cpe:2.3:a:freedesktop:xdg-utils:1.1.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:freedesktop:xdg-utils:1.1.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:freedesktop:xdg-utils:1.1.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:freedesktop:xdg-utils:1.1.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:freedesktop:xdg-utils:1.1.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:freedesktop:xdg-utils:1.1.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:freedesktop:xdg-utils:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:freedesktop:xdg-utils:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:freedesktop:xdg-utils:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:freedesktop:xdg-utils:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:freedesktop:xdg-utils:1.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:freedesktop:xdg-utils:1.1.3:*:*:*:*:*:*:*
CVSS
Base: None
Impact:
Exploitability:
CWE CWE-146
CAPEC
  • Argument Injection
    An attacker changes the behavior or state of a targeted application through injecting data or command syntax through the targets use of non-validated and non-filtered arguments of exposed services or methods.
  • Command Delimiters
    An attack of this type exploits a programs' vulnerabilities that allows an attacker's commands to be concatenated onto a legitimate command with the intent of targeting other resources such as the file system or database. The system that uses a filter or a blacklist input validation, as opposed to whitelist validation is vulnerable to an attacker who predicts delimiters (or combinations of delimiters) not present in the filter or blacklist. As with other injection attacks, the attacker uses the command delimiter payload as an entry point to tunnel through the application and activate additional attacks through SQL queries, shell commands, network scanning, and so on.
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
Last major update 26-11-2022 - 03:18
Published 19-11-2022 - 00:15
Last modified 26-11-2022 - 03:18
Back to Top