First published: Tue Aug 21 2018(Updated: )
An issue was discovered in Bloop Airmail 3 3.5.9 for macOS. Its primary WebView instance implements "webView:decidePolicyForNavigationAction:request:frame:decisionListener:" such that OpenURL is the default URL handler. A navigation request is processed by the default URL handler only if the currentEvent is NX_LMOUSEUP or NX_OMOUSEUP. An attacker may abuse HTML elements with an EventHandler for a chance to validate navigation requests for URLs that are processed during the NX_LMOUSEUP event triggered by clicking an email.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bloop Airmail | =3.3.5.9 | |
Apple macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-15670.
The affected software is Bloop Airmail 3 version 3.5.9 for macOS.
The severity of CVE-2018-15670 is medium, with a severity value of 4.3.
The vulnerability in Bloop Airmail 3 allows a navigation request to be processed by the default URL handler, potentially leading to unauthorized access or other malicious actions.
No, Apple macOS is not vulnerable to CVE-2018-15670.
To fix the vulnerability, update Bloop Airmail 3 to a version that is not affected by CVE-2018-15670.
More information about CVE-2018-15670 can be found at the following link: https://versprite.com/advisories/airmail-3-for-mac-4/
CWE-20 refers to Improper Input Validation, which is a common weakness that can lead to various security issues.