[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] PGP/MIME and S/MIME mail clients vulnerabilities
From:       Florian Weimer <fw () deneb ! enyo ! de>
Date:       2018-05-22 19:06:53
Message-ID: 87vabfbjci.fsf () mid ! deneb ! enyo ! de
[Download RAW message or body]

* Matthew Fernandez:

> I presume what Florian is asking about is Content-ID links [0]. One
> purpose of CID links is to include images as a message part and then
> reference them from the HTML email content. I would think a CID URL
> would not be immediately vulnerable to the "direct exfiltration"
> attack because it shouldn't result in a network fetch; just a lookup
> locally. However, RFC 2392 requires the IDs to be "globally unique"
> and some mail clients (e.g. iOS Mail) take the RFC at its word and
> render images from CID URLs that reference content included in
> entirely distinct emails in your mailbox. Perhaps the attacker can
> hide their payload within a message part with the chosen ID included
> in another email.

Or they can alter the displayed content of a signed message with a
colliding cid: URL, assuming the ones generated by the original client
are not unpredictable (and you might actually have many tries within
the same crafted message).

There could also be some automated exfiltration angles, but those
probably rely on client HTML rendering bugs, so they don't really
count.
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic