7 results (0.010 seconds)

CVSS: 7.4EPSS: 0%CPEs: 1EXPL: 1

When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked. Cuando xdg-mail está configurado para usar Thunderbird para URL de correo, el análisis incorrecto de la URL puede provocar que se pasen encabezados adicionales a Thunderbird que no deberían incluirse según RFC 2368. Un atacante puede usar este método para crear una URL de correo que parezca segura a los usuarios, pero en realidad adjuntará archivos cuando se haga clic en ellos. • https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/205#note_1494267 • CWE-146: Improper Neutralization of Expression/Command Delimiters •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer. When handling mailto: URIs, xdg-email allows attachments to be discreetly added via the URI when being passed to Thunderbird. An attacker could potentially send a victim a URI that automatically attaches a sensitive file to a new email. If a victim user does not notice that an attachment was added and sends the email, this could result in sensitive information disclosure. It has been confirmed that the code behind this issue is in xdg-email and not in Thunderbird. • https://bugzilla.redhat.com/show_bug.cgi?id=1899769 https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/177 • CWE-201: Insertion of Sensitive Information Into Sent Data •

CVSS: 8.8EPSS: 0%CPEs: 8EXPL: 0

The open_envvar function in xdg-open in xdg-utils before 1.1.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by %s in this environment variable. La función open_envvar en xdg-open en xdg-utils en versiones anteriores a la 1.1.3 no valida cadenas antes de iniciar el programa especificado por la variable de entorno BROWSER. Esto permite que atacantes remotos lleven a cabo ataques de inyección de argumentos mediante una URL manipulada, tal y como demuestra %s en esta variable de entorno. • https://bugs.freedesktop.org/show_bug.cgi?id=103807 https://cgit.freedesktop.org/xdg/xdg-utils/commit/?id=5647afb35e4bcba2060148e1a2a47bc43cc240f2 https://cgit.freedesktop.org/xdg/xdg-utils/commit/?id=ce802d71c3466d1dbb24f2fe9b6db82a1f899bcb https://cgit.freedesktop.org/xdg/xdg-utils/tree/ChangeLog https://lists.debian.org/debian-lts-announce/2018/05/msg00014.html https://usn.ubuntu.com/3650-1 https://www.debian.org/security/2018/dsa-4211 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 8.8EPSS: 1%CPEs: 3EXPL: 0

The open_generic_xdg_mime function in xdg-open in xdg-utils 1.1.0 rc1 in Debian, when using dash, does not properly handle local variables, which allows remote attackers to execute arbitrary commands via a crafted file. La función open_generic_xdg_mime en xdg-open en xdg-utils versión 1.1.0 rc1 en Debian, cuando se usa dash, no maneja apropiadamente las variables locales, lo que permite a atacantes remotos ejecutar comandos arbitrarios por medio de un archivo diseñado • http://www.debian.org/security/2015/dsa-3165 http://www.openwall.com/lists/oss-security/2015/02/18/7 http://www.openwall.com/lists/oss-security/2015/02/18/9 http://www.securityfocus.com/bid/72675 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777722 https://bugs.freedesktop.org/show_bug.cgi?id=89129 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 6.8EPSS: 1%CPEs: 1EXPL: 3

Eval injection vulnerability in xdg-utils 1.1.0 RC1, when no supported desktop environment is identified, allows context-dependent attackers to execute arbitrary code via the URL argument to xdg-open. Vulnerabilidad de inyección Eval en xdg-utils 1.1.0 RC1, cuando se identifica que el entorno de escritorio no está soportado, permite a atacantes dependientes de contexto ejecutar código arbitrario a través de un argumento URL a xdg-open. • http://seclists.org/fulldisclosure/2014/Nov/36 http://secunia.com/advisories/62155 http://www.debian.org/security/2015/dsa-3131 http://www.openwall.com/lists/oss-security/2015/01/17/10 http://www.securityfocus.com/bid/71284 https://bugs.freedesktop.org/show_bug.cgi?id=66670 https://bugs.gentoo.org/show_bug.cgi?id=472888 https://security.gentoo.org/glsa/201701-09 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •