Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 12 Mar 2014 08:33:45 +0000
From: Paul <paul@...ws-mail.org>
To: "OSS Security List" <oss-security@...ts.openwall.com>
Subject: Re: CVE request: claws-mail vcalendar plugin stores user/password
 in cleartext

On Mon, 10 Mar 2014 14:31:34 -0600
"Vincent Danen" <vdanen@...hat.com> wrote: 

> Subject pretty much says it all.  It's not a very exciting flaw but
> was brought to our attention.
> 
> References:
> 
> http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3099
> https://bugzilla.redhat.com/show_bug.cgi?id=1074683

I believe that a CVE request for this is probably overkill.

The vCalendar plugin does not support login credentials when
subscribing to a WebCal.

The user can work around this missing feature by adding their username
and password to the URI, e.g.
https://USERNAME:MYPASSWORD@...lserver/home/USERNAME/Calendar

The URI is stored in clear text, hence if the user chooses to work
around the missing feature their un/pw will be stored in clear text.

Similar behaviour can be witnessed in a number of other apps. For
example, if I bookmark
https://USERNAME:MYPASSWORD@...lserver/home/USERNAME/Calendar in
firefox, it will save the credentials in clear text.

There are some apps that will store what the user enters in a
password field as clear text, however Claws Mail is not one of them.

Therefore, on the Claws Mail bug tracker, this is marked as a feature
request and not as a security issue.

with regards

Paul

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ