HTML allows a link to be hidden, but shown as any arbitrary text, such as a user-friendly target name. This can be used in
phishing attacks, in which users are fooled into accessing a counterfeit web site and revealing personal details (like bank account numbers) to a scammer. If an email contains inline content from an external server, such as a
picture, retrieving it requires a request to that external server which identifies where the picture will be displayed and other information about the recipient.
Web bugs are specially created images (usually unique for each individual email) intended to track that email and let the creator know that the email has been opened. Among other things, that reveals that an email address is real, and can be targeted in the future. Some phishing attacks rely on particular features of HTML: • Brand impersonation with procedurally-generated graphics (such graphics can look like a trademarked image but evade security scanning because there is no file) • Text containing invisible
Unicode characters or with a zero-height font to confuse security scanning • Victim-specific URI, where a malicious link encodes special information which allows a counterfeit site to be personalized (appearing as the victim's account) so as to be more convincing. Displaying HTML content frequently involves the client program calling on special routines to parse and render the HTML-coded text; deliberately mis-coded content can then exploit mistakes in those routines to create security violations. Requests for special fonts, etc, can also impact system resources. During periods of increased network threats, the US Department of Defense has converted user's incoming HTML email to text email. The multipart type is intended to show the same content in different ways, but this is sometimes abused; some
email spam takes advantage of the format to trick
spam filters into believing that the message is legitimate. They do this by including innocuous content in the text part of the message and putting the spam in the HTML part (that which is displayed to the user). Most email spam is sent in HTML for these reasons, so spam filters sometimes give higher spam scores to HTML messages. In 2018 a vulnerability (
EFAIL) of the HTML processing of many common email clients was disclosed, in which decrypted text of
PGP or
S/MIME encrypted email parts can be caused to be sent as an attribute to an external image address, if the external image is requested. This vulnerability was present in Thunderbird, macOS Mail, Outlook, and later, Gmail and Apple Mail. == See also ==