[GH-ISSUE #423] Potential attack using "mailto:" #351

Closed
opened 2026-02-25 21:34:49 +03:00 by kerem · 1 comment
Owner

Originally created by @dumblob on GitHub (Aug 24, 2020).
Original GitHub issue: https://github.com/cypht-org/cypht/issues/423

Originally assigned to: @jasonmunro on GitHub.

I'm not sure Cypht does anything special with "mailto:" links, but either way it might be interesting to see what threats are lurking around:

https://www.zdnet.com/article/some-email-clients-are-vulnerable-to-attacks-via-mailto-links/

Originally created by @dumblob on GitHub (Aug 24, 2020). Original GitHub issue: https://github.com/cypht-org/cypht/issues/423 Originally assigned to: @jasonmunro on GitHub. I'm not sure Cypht does anything special with "mailto:" links, but either way it might be interesting to see what threats are lurking around: https://www.zdnet.com/article/some-email-clients-are-vulnerable-to-attacks-via-mailto-links/
kerem 2026-02-25 21:34:49 +03:00
Author
Owner

@jasonmunro commented on GitHub (Sep 17, 2020):

Cypht supports mailto links to pre-populate the To, Cc, Bcc, Subject, and Body fields. This specific vulnerability uses the more esoteric attachment parameter to pre-attach a local file which we don't support so we should be good here.

<!-- gh-comment-id:694481999 --> @jasonmunro commented on GitHub (Sep 17, 2020): Cypht supports mailto links to pre-populate the To, Cc, Bcc, Subject, and Body fields. This specific vulnerability uses the more esoteric attachment parameter to pre-attach a local file which we don't support so we should be good here.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/cypht#351
No description provided.