CVE-2019-9149

Mailvelope prior to 3.3.0 allows private key operations without user interaction via its client-API. By modifying an URL parameter in Mailvelope, an attacker is able to sign (and encrypt) arbitrary messages with Mailvelope, assuming the private key password is cached. A second vulnerability allows an attacker to decrypt an arbitrary message when the GnuPG backend is used in Mailvelope.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mailvelope:mailvelope:*:*:*:*:*:*:*:*

History

18 Apr 2022, 16:56

Type Values Removed Values Added
References (MISC) https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html - (MISC) https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html - Third Party Advisory
References (MISC) https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.pdf?__blob=publicationFile&v=3 - (MISC) https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.pdf?__blob=publicationFile&v=3 - Exploit, Third Party Advisory
CWE CWE-320 CWE-863
CWE-347

Information

Published : 2019-07-09 21:15

Updated : 2023-12-10 12:59


NVD link : CVE-2019-9149

Mitre link : CVE-2019-9149

CVE.ORG link : CVE-2019-9149


JSON object : View

Products Affected

mailvelope

  • mailvelope
CWE
CWE-347

Improper Verification of Cryptographic Signature

CWE-863

Incorrect Authorization