vendor:
Airmail
by:
redrain, yu.hong@chaitin.com
8,8
CVSS
HIGH
File:// XSS and Arbitrary File Read
79
CWE
Product Name: Airmail
Affected Version From: 3.0.2
Affected Version To: Earlier
Patch Exists: Yes
Related CWE: N/A
CPE: a:airmailapp:airmail
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: OS X and iOS
2016
Airmail File:// XSS and Arbitrary File Read
Airmail implements its user interface using an embedded version of WebKit, furthermore Airmail on OS X will render any URI as a clickable HTML <a href= link. An attacker can create a simple JavaScript URI (e.g., javascript:) which when clicked grants the attacker initial JavaScript execution (XSS) in the context of the application DOM. An attacker can also use a JavaScript URI to read arbitrary files from the local file system.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should update to the latest version of Airmail.