An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. include/rcmail_output_html.php allows XSS via the username template object.
References
Link | Resource |
---|---|
https://github.com/roundcube/roundcubemail/releases/tag/1.3.12 | Release Notes |
https://github.com/roundcube/roundcubemail/commit/37e2bc745723ef6322f0f785aefd0b9313a40f19 | Patch |
https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12 | Vendor Advisory |
https://github.com/roundcube/roundcubemail/releases/tag/1.4.5 | Release Notes |
https://www.debian.org/security/2020/dsa-4700 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ODPJXBHZ32QSP4MYT2OBCALYXSUJ47SK/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLESQ4LPJGMSWHQ4TBRTVQRDG7IXAZCW/ | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2020-06-08 20:15
Updated : 2023-03-02 18:46
NVD link : CVE-2020-13964
Mitre link : CVE-2020-13964
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
debian
- debian_linux
fedoraproject
- fedora
roundcube
- webmail