<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2020-27748</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2020-27748</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>27</Number>
        <Date>2023-06-27T23:44:39Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-30T14:44:53Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-06-27T23:44:39Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2020-27748</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer. When handling mailto: URIs, xdg-email allows attachments to be discreetly added via the URI when being passed to Thunderbird. An attacker could potentially send a victim a URI that automatically attaches a sensitive file to a new email. If a victim user does not notice that an attachment was added and sends the email, this could result in sensitive information disclosure. It has been confirmed that the code behind this issue is in xdg-email and not in Thunderbird.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="HPE Helion OpenStack 8">
      <Branch Type="Product Name" Name="HPE Helion OpenStack 8">
        <FullProductName ProductID="HPE Helion OpenStack 8" CPE="cpe:/o:suse:hpe-helion-openstack:8">HPE Helion OpenStack 8</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Point of Service 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Point of Service 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Point of Service 11 SP3" CPE="cpe:/a:suse:sle-pos:11:sp3">SUSE Linux Enterprise Point of Service 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP1 for Teradata">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP1 for Teradata">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1 for Teradata" CPE="cpe:/o:suse:suse_sles_teradata:11:sp1">SUSE Linux Enterprise Server 11 SP1 for Teradata</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3 for Teradata">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3 for Teradata">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3 for Teradata" CPE="cpe:/o:suse:suse_sles_teradata:11:sp3">SUSE Linux Enterprise Server 11 SP3 for Teradata</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4 LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4 LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp4">SUSE Linux Enterprise Server 11 SP4 LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud 8">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud 8">
        <FullProductName ProductID="SUSE OpenStack Cloud 8" CPE="cpe:/o:suse:suse-openstack-cloud:8">SUSE OpenStack Cloud 8</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud Crowbar 8">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud Crowbar 8">
        <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8" CPE="cpe:/o:suse:suse-openstack-cloud-crowbar:8">SUSE OpenStack Cloud Crowbar 8</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xdg-utils">
      <FullProductName ProductID="xdg-utils" CPE="cpe:2.3:a:freedesktop:xdg-utils:*:*:*:*:*:*:*:*">xdg-utils</FullProductName>
    </Branch>
    <Relationship ProductReference="xdg-utils" RelationType="Default Component Of" RelatesToProductReference="HPE Helion OpenStack 8">
      <FullProductName ProductID="HPE Helion OpenStack 8:xdg-utils">xdg-utils as a component of HPE Helion OpenStack 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xdg-utils" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Service 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Service 11 SP3:xdg-utils">xdg-utils as a component of SUSE Linux Enterprise Point of Service 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xdg-utils" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP1 for Teradata">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1 for Teradata:xdg-utils">xdg-utils as a component of SUSE Linux Enterprise Server 11 SP1 for Teradata</FullProductName>
    </Relationship>
    <Relationship ProductReference="xdg-utils" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3 for Teradata">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3 for Teradata:xdg-utils">xdg-utils as a component of SUSE Linux Enterprise Server 11 SP3 for Teradata</FullProductName>
    </Relationship>
    <Relationship ProductReference="xdg-utils" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4 LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4 LTSS:xdg-utils">xdg-utils as a component of SUSE Linux Enterprise Server 11 SP4 LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xdg-utils" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 8">
      <FullProductName ProductID="SUSE OpenStack Cloud 8:xdg-utils">xdg-utils as a component of SUSE OpenStack Cloud 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="xdg-utils" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 8">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8:xdg-utils">xdg-utils as a component of SUSE OpenStack Cloud Crowbar 8</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer. When handling mailto: URIs, xdg-email allows attachments to be discreetly added via the URI when being passed to Thunderbird. An attacker could potentially send a victim a URI that automatically attaches a sensitive file to a new email. If a victim user does not notice that an attachment was added and sends the email, this could result in sensitive information disclosure. It has been confirmed that the code behind this issue is in xdg-email and not in Thunderbird.</Note>
    </Notes>
    <CVE>CVE-2020-27748</CVE>
    <ProductStatuses>
      <Status Type="Known Not Affected">
        <ProductID>SUSE Linux Enterprise Point of Service 11 SP3:xdg-utils</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP1 for Teradata:xdg-utils</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3 for Teradata:xdg-utils</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4 LTSS:xdg-utils</ProductID>
      </Status>
      <Status Type="Known Affected">
        <ProductID>HPE Helion OpenStack 8:xdg-utils</ProductID>
        <ProductID>SUSE OpenStack Cloud 8:xdg-utils</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:xdg-utils</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>4.3</BaseScoreV2>
        <VectorV2>AV:N/AC:M/Au:N/C:P/I:N/A:N</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>5.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
