Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube Webmail 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter to the default URI.
References
Link | Resource |
---|---|
https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released | Patch Vendor Advisory |
https://github.com/roundcube/roundcubemail/issues/4837 | Issue Tracking Patch Third Party Advisory |
https://github.com/roundcube/roundcubemail/commit/b782815dacda55eee6793249b5da1789256206fc | Issue Tracking Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/07/07/2 | Mailing List Patch Third Party Advisory |
http://trac.roundcube.net/ticket/1490417 | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-05-22 21:29
Updated : 2018-10-30 09:27
NVD link : CVE-2015-5381
Mitre link : CVE-2015-5381
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
roundcube
- roundcube_webmail
- webmail