[Tickets #5892] Re: Linked attachment feature vulnerability

bugs at bugs.horde.org bugs at bugs.horde.org
Fri Nov 16 01:10:22 UTC 2007


DO NOT REPLY TO THIS MESSAGE. THIS EMAIL ADDRESS IS NOT MONITORED.

Ticket URL: http://bugs.horde.org/ticket/?id=5892
-----------------------------------------------------------------------
 Ticket             | 5892
 Updated By         | Chuck Hagenbuch <chuck at horde.org>
 Summary            | Linked attachment feature vulnerability
 Queue              | IMP
 Version            | 4.1.3
 Type               | Bug
-State              | Unconfirmed
+State              | Feedback
-Priority           | 3. High
+Priority           | 2. Medium
 Owners             | 
-----------------------------------------------------------------------


Chuck Hagenbuch <chuck at horde.org> (2007-11-15 17:10) wrote:

> By exploiting the jar: protocol feature of Mozilla Firefox and the 
> fact that the Imp Web Client allows things like 
>
"https://mail.server/horde/imp/attachment.php?u=user&t=4827164921&f=example.jpg",
it's possible to execute various XSS attacks. For example: 
>
"jar:https://mail.server/horde/imp/attachment.php?u=user&t=4827164921&f=example.jar!/evil.htm".

I'm certainly sensitive to security concerns, but there are several
reasons I don't think this is a vulnerability in IMP itself, though IMP
might be "involved" in exploiting it:

- When downloading linked attachments, we send a content-disposition of
attachment. If the browser displays files directly anyway... there's only
so much we can do about that.

- If I'm reading correctly, you have to prepend jar: to the URL for this
to happen. IMP will never do that, so someone would have to send a
hand-crafted email containing the malicious URL.

- If the attacker is crafting their own URL anyway, isn't it a lot simpler
to put their malicious file somewhere else, and to make it look more
enticing then an email attachment? Admittedly this is a dodge, but I think
the other reasons are more valid.

- A user could upload other kinds of "bad" content to an attachment and
send them out. That makes this a file delivery mechanism - we should
probably have a hook for scanning and accepting/rejecting linked
attachments - but that's no more a vulnerability than an FTP site is.

If you don't disagree, I'll turn this into an enhancement ticket to add a
hook for scanning linked attachments (probably easier to have it handle all
attachments and accept/reject on initial upload, actually). If you do
disagree, please explain, and we'll see where we are.

Thanks,
Chuck



More information about the bugs mailing list