You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Reported by @thomascube on 16 Jan 2016 16:36 UTC as Trac ticket #1490642
Message attachments are downloaded via GET requests (with _download=1) and therefore can be triggered by a 3rd party site with guessed URLs and an active session in the victims browser. While this doesn't disclose any data to the attacker site, it triggers unwanted file downloads and puts load on the server as well as fills the victims disk if executed repeatedly.
We already have CSRF protection means with session-based request tokens. Requiring such tokens on download urls would add the necessary protection against these unwanted downloads.
Reported by @thomascube on 16 Jan 2016 16:36 UTC as Trac ticket #1490642
Message attachments are downloaded via GET requests (with
_download=1
) and therefore can be triggered by a 3rd party site with guessed URLs and an active session in the victims browser. While this doesn't disclose any data to the attacker site, it triggers unwanted file downloads and puts load on the server as well as fills the victims disk if executed repeatedly.We already have CSRF protection means with session-based request tokens. Requiring such tokens on download urls would add the necessary protection against these unwanted downloads.
Migrated-From: http://trac.roundcube.net/ticket/1490642
The text was updated successfully, but these errors were encountered: