2 results (0.009 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

K-9 Mail v5.600 can include the original quoted HTML code of a specially crafted, benign looking, email within (digitally signed) reply messages. The quoted part can contain conditional statements that show completely different text if opened in a different email client. This can be abused by an attacker to obtain valid S/MIME or PGP signatures for arbitrary content to be displayed to a third party. NOTE: the vendor states "We don't plan to take any action because of this." K-9 Mail v5.600 puede incluir el código HTML original entrecomillado de un correo electrónico especialmente manipulado y de aspecto benigno en los mensajes de respuesta (con firma digital). • https://github.com/k9mail/k-9/issues/3925 • CWE-254: 7PK - Security Features •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

K9Mail version <= v5.600 contains a XML External Entity (XXE) vulnerability in WebDAV response parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via malicious WebDAV server or intercept the reponse of a valid WebDAV server. K9Mail, en versiones iguales o anteriores a la v5.600, contiene una vulnerabilidad XEE (XML External Entity) en el analizador de respuestas WebDAV que puede resultar en la divulgación de datos confidenciales, denegación de servicio, SSRF o escaneo de puertos. Este ataque parece ser explotable mediante un servidor WebDAV malicioso o interceptando la respuesta de un servidor WebDAV válido. • https://0dd.zone/2018/10/28/k9mail-XXE-MitM https://github.com/k9mail/k-9/issues/3681 • CWE-611: Improper Restriction of XML External Entity Reference •