Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker
to load arbitrary JavaScript code.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 08:42
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
References | () http://www.openwall.com/lists/oss-security/2023/11/01/1 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/11/01/3 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/11/17/2 - Mailing List, Third Party Advisory | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054079 - Mailing List, Patch, Third Party Advisory | |
References | () https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d - Patch | |
References | () https://github.com/roundcube/roundcubemail/commit/6ee6e7ae301e165e2b2cb703edf75552e5376613 - Patch | |
References | () https://github.com/roundcube/roundcubemail/issues/9168 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/roundcube/roundcubemail/releases/tag/1.4.15 - Release Notes | |
References | () https://github.com/roundcube/roundcubemail/releases/tag/1.5.5 - Release Notes | |
References | () https://github.com/roundcube/roundcubemail/releases/tag/1.6.4 - Release Notes | |
References | () https://lists.debian.org/debian-lts-announce/2023/10/msg00035.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LK67Q46OIEGJCRQUBHKLH3IIJTBNGGX4/ - Mailing List | |
References | () https://roundcube.net/news/2023/10/16/security-update-1.6.4-released - Release Notes | |
References | () https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15 - Release Notes | |
References | () https://www.debian.org/security/2023/dsa-5531 - Third Party Advisory |
22 Dec 2023, 18:55
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-18 15:15
Updated : 2024-11-21 08:42
NVD link : CVE-2023-5631
Mitre link : CVE-2023-5631
CVE.ORG link : CVE-2023-5631
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
roundcube
- webmail
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')