I found out that attachments containing Javascript or HTML will get executed in the browser once you open in a new tab. The attachment can be anything simple like .html, .svg containing our payload.
[code language=”html”]
<html>
<script>
prompt(‘XSS by Osanda Malith’);
</script>
</html>
[/code]
Once you open the attachment the code gets interpreted.
However due to the same origin policy this bug can’t do much damage. If you do a alert(window.sessionStorage.protonmail_pw)
it would result “undefined”.
email attachment with malicious js !!! is it fixed now ? 😉
They won’t fix it I guess 🙂