GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://rhn.redhat.com/errata/RHSA-2013-0516.html
https://git.gnome.org/browse/evolution/commit/?id=588c410718068388f8ce0004a71c104a4c89cce3
https://git.gnome.org/browse/evolution/commit/?id=0a478083fa31aec0059bc6feacc054226fe55b56
https://exchange.xforce.ibmcloud.com/vulnerabilities/82450
https://bugzilla.redhat.com/show_bug.cgi?id=733504
https://bugzilla.gnome.org/show_bug.cgi?id=657374
Source: Mitre, NVD
Published: 2013-03-08
Updated: 2025-04-11
Base Score: 4.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N
Severity: Medium
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity: High
EPSS: 0.00129