Hacker News new | past | comments | ask | show | jobs | submit login

Full Twitter thread text by @jensvoid here, since the thread appears to be broken for some people:

Have you ever heard of the mailto:?attach=~/… parameter? It allows to include arbitrary files on disk. So, why break PGP if you can politely ask the victim's mail client to include the private key? (1/4)

You can even leak complete directories in some mail clients. Interestingly, Evolution shows a warning if you want to include a single file, but the full home directory is fine. (2/4)

Such simple stupid mailto:?attach tricks worked in Thunderbird for Debian, GNOME Evolution (CVE-2020-11879), KDE KMail (CVE-2020-11880), IBM/HCL Notes (CVE-2020-4089), and Pegasus Mail. (3/4)

This flaw, among others, is described in our IEEE CNS paper "Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption" with @lambdafu , @dues__ , @seecurity , and @joergschwenk : https:// nds.ruhr-uni-bochum.de/media/nds/veroeffentlichungen/2020/08/15/mailto-paper.pdf (4/4)




A later reply identifies the xdg-utils package responsible for the issue. As reported by author of the tweets:

https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/177





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: