Vulnerability Description
When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freedesktop | Xdg-Utils | >= 1.1.0, <= 1.1.3 |
Related Weaknesses (CWE)
References
- https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/205#note_1494267ExploitIssue TrackingThird Party Advisory
- https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/205#note_1494267ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2022-4055?
CVE-2022-4055 is a vulnerability with a CVSS score of 7.4 (HIGH). When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An atta...
How severe is CVE-2022-4055?
CVE-2022-4055 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-4055?
Check the references section above for vendor advisories and patch information. Affected products include: Freedesktop Xdg-Utils.