Medium Severity
Attachment: Embedded Javascript in SVG file (unsolicited)
Labels
Description
Javascript inside SVG files can be used to smuggle malicious payloads or execute scripts.
References
Sublime Security
Created Aug 17th, 2023 • Last updated Oct 4th, 2023
Feed Source
Sublime Core Feed
Source
type.inbound
and any(attachments,
(.file_extension =~ "svg" or .file_extension in $file_extensions_common_archives)
and any(file.explode(.),
.file_extension == "svg"
and "script" in~ .scan.xml.tags
// unclear if this is necessary, but it's been observed
// in all payloads we've seen, so we'll include it
// as an extra FP precaution
and any(.scan.strings.strings, strings.icontains(., "CDATA"))
)
)
and (
not profile.by_sender().solicited
or (
profile.by_sender().any_messages_malicious_or_spam
and not profile.by_sender().any_false_positives
)
)
Playground
Test against your own EMLs or sample data.