security/privacy issue with using gobby to open attachments in evolution

Bug #660580 reported by Steve Conklin
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
gobby (Ubuntu)
Won't Fix
Low
Unassigned

Bug Description

Binary package hint: gobby

This is a usability issue that creates a security/privacy issue

Gobby is presented as an option for opening attachments in the evolution mail client.

The user is presented with a small "down arrow" next to an attachment listing in evolution, which presents options for opening the attachment in various applications. If the user simply clicks on the arrow, the action can be taken to open the attachment using one of the applications on the menu. The menu length depends on the attachment type and hence the number of applications listed. In my case, a single click results in the attachment being opened with gobby, which connects to the last host I used and pastes the name of the file into the gobby chat.

Since sensitive information if often sent by email within companies, this creates an inintentional leak of attachments to the collaborative gobby server.

ProblemType: Bug
DistroRelease: Ubuntu 10.04
Package: gobby 0.4.12-1
ProcVersionSignature: Ubuntu 2.6.32-25.44-generic-pae 2.6.32.21+drm33.7
Uname: Linux 2.6.32-25-generic-pae i686
Architecture: i386
Date: Thu Oct 14 09:46:30 2010
EcryptfsInUse: Yes
InstallationMedia: Ubuntu 10.04 "Lucid Lynx" - Beta i386 (20100318)
ProcEnviron:
 PATH=(custom, user)
 LANG=en_US.utf8
 SHELL=/bin/bash
SourcePackage: gobby

Revision history for this message
Steve Conklin (sconklin) wrote :
Steve Conklin (sconklin)
description: updated
Steve Conklin (sconklin)
security vulnerability: no → yes
Revision history for this message
Philipp Kern (pkern) wrote :

I'm not sure I agree that this is an information leak. All Gobby does is listing its capability to serve as an (text) editor in its .desktop file. It might be questionable if it should be listed as a text editor in, say, Firefox. Which file type did you try to open? It should only be responsible for files that are detected with the text/plain mime-type, e.g. .txt files.

Furthermore, it pastes the filename instead of opening it? If so I really tend not to consider this as a serious leak of information. If the file is uploaded to the server, this might be different. (It might be sane to invoke a dialog if the file should really be uploaded to the server then.)

Changed in gobby (Ubuntu):
status: New → Confirmed
importance: Undecided → Low
Steve Conklin (sconklin)
Changed in gobby (Ubuntu):
status: Confirmed → Won't Fix
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.