CVE-2011-3201Sensitive Information Exposure in Evolution

Severity
4.3MEDIUMNVD
EPSS
0.8%
top 25.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 8
Latest updateMay 17

Description

GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.

CVSS vector

AV:N/AC:M/C:P/I:N/A:NExploitability: 8.6 | Impact: 2.9

Patches

🔴Vulnerability Details

3
GHSA
GHSA-vj43-93vc-r5g8: GNOME Evolution before 32022-05-17
CVEList
CVE-2011-3201: GNOME Evolution before 32013-03-08
OSV
CVE-2011-3201: GNOME Evolution before 32013-03-08

📋Vendor Advisories

2
Red Hat
evolution: mailto URL scheme attachment header improper input validation2011-08-25
Debian
CVE-2011-3201: evolution - GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbit...2011

💬Community

2
Bugzilla
CVE-2011-3201 evolution: mailto: attachment parameter can lead to accidental data exfiltration [fedora-all]2011-11-25
Bugzilla
CVE-2011-3201 evolution: mailto URL scheme attachment header improper input validation2011-08-25
CVE-2011-3201 — Sensitive Information Exposure | cvebase