[Users] [Bug 4159] New: Decryption Oracle based on replying to PGP or S/MIME encrypted emails
noreply at thewildbeast.co.uk
noreply at thewildbeast.co.uk
Fri Feb 22 14:25:25 CET 2019
https://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=4159
Bug ID: 4159
Summary: Decryption Oracle based on replying to PGP or S/MIME
encrypted emails
Classification: Unclassified
Product: Claws Mail
Version: 3.14.1
Hardware: PC
OS: Linux
Status: NEW
Severity: normal
Priority: P3
Component: Plugins/Privacy/PGP
Assignee: users at lists.claws-mail.org
Reporter: jens.a.mueller+claws at rub.de
In the scope of academic research in cooperation with Ruhr-Uni Bochum and FH
Münster, Germany we discovered a security issue in Claws: An attacker who is in
possession of PGP encrypted messages can append them to her own text. If the
victim replies, the plaintext is leaked to an attacker's email address.
-----------------------------------
*Leaking plaintext through replies*
-----------------------------------
/Attacker model/: Attacker is in possession of PGP encrypted messages, which
she may have obtained as passive man-in-the-middle or by actively hacking into
the victim's mail server or gateway
/Attacker's goal/: Leak the plaintext by wrapping the ciphertext within a
benign-looking email sent to and decrypted+replied to by the victim
/Attack outline:/ If Claws receives a text/plain email as depicted below, it
decrypt the ciphertext part(s), and shows it together with the
attacker-controlled text (which may be prepended and/or appended).
[Attacker's text]
-----BEGIN PGP MESSAGE-----
[Unknown ciphertext]
-----END PGP MESSAGE-----
[Some more attacker's text]
A benign-looking attacker's text may lure the victim into replying. Because the
decrypted text is also quoted in the reply, the user unintentionally acts as a
decryption oracle. To obfuscate the existence of the encrypted text, the
attacker may add a lot of newlines or hide it within a long conversation
history. A user replying to such a ‘mixed content’ conversation thereby leaks
the plaintext of encrypted messages wrapped within attacker-controlled text.
This attack works for PGP/INLINE and PGP/MIME captured ciphertexts because
PGP/INLINE can be downgraded to PGP/MIME.
Another option to perform the attack is by using multipart emails with PGP or
S/MIME encrypted parts, as depicted below:
multipart/mixed
|--- Attacker's part
|--- [encrypted part]
+--- Attacker's part
Again, Claws decrypts the ciphertext part(s), together with the
attacker-controlled text. However, the only the first part is included in the
reply (unless the user marks then whole message text). This attack works for
PGP/MIME and S/MIME captured ciphertext.
---------------
Countermeasures
---------------
Do not decrypt encrypted emails unless there is only one single encrypted
text/part.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the Users
mailing list