Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-updates/2016-10/msg00065.html | Third Party Advisory |
http://www.debian.org/security/2016/dsa-3697 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/10/05/1 | Third Party Advisory |
http://www.securityfocus.com/bid/93360 | Third Party Advisory VDB Entry |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNMM5TVPTJQFPJ3YDF4DPXDFW3GQLWLY/ |
Configurations
History
No history.
Information
Published : 2016-12-23 22:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-7966
Mitre link : CVE-2016-7966
CVE.ORG link : CVE-2016-7966
JSON object : View
Products Affected
debian
- debian_linux
kde
- kmail
fedoraproject
- fedora
suse
- linux_enterprise
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')