CVE-2015-5381

Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube Webmail 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter to the default URI.
References
Link Resource
http://trac.roundcube.net/ticket/1490417 Issue Tracking Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/07/07/2 Mailing List Patch Third Party Advisory
https://github.com/roundcube/roundcubemail/commit/b782815dacda55eee6793249b5da1789256206fc Issue Tracking Patch Third Party Advisory
https://github.com/roundcube/roundcubemail/issues/4837 Issue Tracking Patch Third Party Advisory
https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:roundcube:roundcube_webmail:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:1.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:1.1:beta:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:1.1:rc:*:*:*:*:*:*

History

No history.

Information

Published : 2017-05-23 04:29

Updated : 2024-02-04 19:11


NVD link : CVE-2015-5381

Mitre link : CVE-2015-5381

CVE.ORG link : CVE-2015-5381


JSON object : View

Products Affected

roundcube

  • roundcube_webmail
  • webmail
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')