CVE-2020-27748
Publication date 24 November 2020
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer. When handling mailto: URIs, xdg-email allows attachments to be discreetly added via the URI when being passed to Thunderbird. An attacker could potentially send a victim a URI that automatically attaches a sensitive file to a new email. If a victim user does not notice that an attachment was added and sends the email, this could result in sensitive information disclosure. It has been confirmed that the code behind this issue is in xdg-email and not in Thunderbird.
Status
Package | Ubuntu Release | Status |
---|---|---|
xdg-utils | ||
20.04 LTS focal | Ignored | |
18.04 LTS bionic | Ignored | |
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Not in release |
Notes
leosilva
the patch was made in a stable release removing the functionality of --attach in thuderbird and other applications we decided to mark it as ignored since it causes regression cross applications. Also, considers it not as medium since the attach ability requires users permissions.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-4649-1
- xdg-utils vulnerability
- 26 November 2020