CVE-2016-7966

Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kde:kmail:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*

History

07 Nov 2023, 02:35

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNMM5TVPTJQFPJ3YDF4DPXDFW3GQLWLY/', 'name': 'FEDORA-2016-92c112a380', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNMM5TVPTJQFPJ3YDF4DPXDFW3GQLWLY/ -

Information

Published : 2016-12-23 22:59

Updated : 2023-12-10 12:01


NVD link : CVE-2016-7966

Mitre link : CVE-2016-7966

CVE.ORG link : CVE-2016-7966


JSON object : View

Products Affected

debian

  • debian_linux

kde

  • kmail

fedoraproject

  • fedora

suse

  • linux_enterprise
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')