Summary: | HTML Allows Spoofing of Emails Content | ||
---|---|---|---|
Product: | [Unmaintained] kmail | Reporter: | Noam Rathaus <noamr> |
Component: | messageviewer | Assignee: | kdepim bugs <kdepim-bugs> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | ana, bjoern, dominik.tritscher, jtamate, lemma, protomank, security |
Priority: | NOR | Keywords: | testcase, triaged |
Version: | 1.10.90 | ||
Target Milestone: | --- | ||
Platform: | Debian testing | ||
OS: | Linux | ||
Latest Commit: | Version Fixed In: | ||
Sentry Crash Report: | |||
Attachments: | Exploit code |
Description
Noam Rathaus
2004-12-30 09:42:13 UTC
Vulnerability has been assigned: CAN-2005-0404 Could you attach the exploit as attachment to this bugreport, otherwise the bugsystem mangles it. Thanks! Created attachment 9684 [details]
Exploit code
More info at: http://www.securityfocus.com/bid/13085 Does this affect the KMail in KDE 3.4.0? In any case, the issue is two months old. Some sort of fix or response would be great. Thanks. it does affect kmail 3.4 the same way it affected all older versions. however, this proof of concept is pretty lame. it doesn't match the colors, the fonts or even the font sizes. of course you could theoretically tune for that. it doesn't have the usual link to the status popup though, and its clearly mentioned in several places that HTML rendering has phishing problems, and HTML rendering is *disabled* by *default* in kmail, and you get a pretty huge warning if you still enable it. anyway, the html bar also indicates that this is a spoofed message. maybe not in an obvious way. the only way we could mitigate this attack for real though is to load the actual content in a separate frame, so that it cannot paint over kmail specific HTML. This is a long term todo, and there are a few bits missing in KHTML in order to achieve that. so I'd either close it as wontfix or as duplicate, whatever you prefer. Well, perhaps keep it open, since this is a problem, just one not as serious as one might think at first glance. Thanks for explaining the situation - it was very helpful. Cheers. The colors, fonts and font sizes all match my version of Kmail/KDE, not to mention that they can be customized to any requirements. The HTML Bar shouldn't appear if the font sizes match and the screen resolution is known, as it is overlapped by the HTML content, which is what the vulnerability is all about. Overlapping of critical information by HTML code. I don't doubt that the colors/fonts etc match your settings of kmail, but they don't match mine, and thats probably true for a lot of people. so its not so easy to write a generic phishing this way. Also, the html bar is not hidden for me here (KMail HEAD, but there haven't been changes in that area for ages. Probably 3.4 is not affected). IMHO the following are all duplicates of this bug: Bug #96557 Bug #109625 Bug #123395 Someone with enough permissions please mark these bugs as such. FYI, just marked the latter 2 dups of the 1st. Leaving 1st alone, for now, it already contains a reference to this. FWIW: The bar on the left side which can be enabled/disabled by the user in the configuration dialog and which either shows "No HTML Message" or "HTML Message" can't be overlapped by the HTML content. The HTML content is restricted to the KHTML widget and the side bar is a widget of its own. Thus overlapping is technically impossible. Just checked that with kmail from KDE4 trunk (r860647). The HTML warning is not overwritten by the testmail, but the rendering looks like a correctly signed massage. So basically this is still an issue, as long as the signing infos are rendered within the message itself. With the new messagelist there is allways information that says the message has a signature or not, or is encrypted or not, but I'm sure most users will only see the fancy rendering saying the mail is signed and the signature is valid. To solve the phising, the way the signature information is shown must change a lot and must not be possible to simulate it with html mails (or the next great mail format with pretty colors). And, very important, the users must be trained to not trust mail messages until they check the message is valid. I'm almost sure that if the exploit is seen with other mail clients, a lot of users will also trust the mail content. *** Bug 48568 has been marked as a duplicate of this bug. *** SVN commit 940115 by tmcguire: Make sure HTMl messages can not overwrite the header. BUG: 96557 CCBUG: 96020 M +9 -0 objecttreeparser.cpp WebSVN link: http://websvn.kde.org/?view=rev&revision=940115 SVN commit 940769 by tmcguire: Backport r940115 by tmcguire from trunk to the 4.2 branch: Make sure HTMl messages can not overwrite the header. CCBUG: 96557 CCBUG: 96020 M +9 -0 objecttreeparser.cpp WebSVN link: http://websvn.kde.org/?view=rev&revision=940769 As reported this bug is no longer reproducible, should it be closed? No objections - just doing it. |