6.0.0-beta1
▾
Tasks
New Task
Search
Photos
Wiki
▾
Tickets
New Ticket
Search
dev.horde.org
Toggle Alerts Log
Help
9/19/25
H
istory
A
ttachments
C
omment
W
atch
Download
Comment on [#5892] Linked attachment feature vulnerability
*
Your Email Address
*
Spam protection
Enter the letters below:
. ..__ \ /.___..__ | |[__) >< | [__) |__|| \/ \ | [__)
Comment
> I guess that won't do the job either... cause it doesn't matter the > extension you use, the jar: protocol will interpret it as if it was a > jar file... i think that the solution begins with "hiding" the > original attachment. Another google example (this time a good one :P): > > > > http://mail.google.com/mail/?attid=0.1&disp=attd&view=att&th=1166689ac6fe384d > > > > I'm not sure, but i think that what happens in this situation, is > that an internal script is run and then you have access to the > desired attachment. But not directly. > > > > > >> Poster wrote back clarifying that this is an XSS issue > >> (http://blog.beford.org/?p=8). I'm still not sure that this is a > >> vulnerability that we can solve in IMP. > >> > >> To the poster: what is your suggested solution here? Any particular > >> site can turn off linked attachments. But any application that hosts > >> files is "vulnerable" to this. So what can an app do, aside from > >> disallowing jar files? > >
Attachment
Watch this ticket
N
ew Ticket
M
y Tickets
S
earch
Q
uery Builder
R
eports
Saved Queries
Open Bugs
Bugs waiting for Feedback
Open Bugs in Releases
Open Enhancements
Enhancements waiting for Feedback
Bugs with Patches
Enhancements with Patches
Release Showstoppers
Stalled Tickets
New Tickets
Horde 5 Showstoppers