From:
To: ██████████
Product: Mailbird
Date: August 5th, 2019
Date of public disclosure: November 16th, 2019
Attachments:
mailbird.zip
Hey Mailbird Team,
I've just started using Mailbird recently, and so far I really like it. It has a really intuitive and beautiful UI.
I'm writing to you because I have discovered a few security vulnerabilities in Mailbird that allow attackers to execute Javascript code contained within a HTML mail message in a privileged context.
The methods by which this can happen are as follows. I've included a proof of concept for each in the attached zip file (password is ██████).
<link rel=import
. This requires no user interaction to execute code.embed
tag. This requires no user interaction to execute code.onmousemove
attribute. This requires the user to move their mouse over the email body before code is executed.javascript:
URI. This requires the user to click a link before code is executed.data:
URI containing a <script
element. This requires the user to click a link before code is executed. (Edit 10/29: Patched)javascript:
URI within an HTML formaction
attribute. This requires the user to click a button before code is executed.
To reproduce these issues, load each of the proofs of concept from the attached zip file (password is ██████) into Mailbird as an HTML mail message.
Once a hypothetical attacker has achieved Javascript execution in the user's email client via one of the above vectors, they can:
loadHtml
function. This access persists until Mailbird is closed.A demonstration of these capabilities is included in poc-extcap.html
, included in the attached zip file.
To fix these vulnerabilities and preempt similar vulnerabilities in the future, I would recommend that the following steps be taken:
I will be following the industry standard of responsible disclosure with these vulnerabilities, as elucidated in Google's policy. Your deadline is (August 5 + 90 days = ) November 3rd, 2019.
Please notify me when you have successfully reproduced the bugs using my proofs of concept, or if you have trouble reproducing the vulnerabilities. Additionally, feel free to email me about any other matter in connection with my report; I'm here to help.
Thank you for your time.
Kind regards,
Sam Haskins