program/lib/Roundcube/rcube_washtml.php in Roundcube before 1.0.5 does not properly quote strings, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the style attribute in an email.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://trac.roundcube.net/changeset/786aa0725/github | |
http://www.securityfocus.com/bid/72401 | vdb entry |
http://trac.roundcube.net/ticket/1490227 | exploit vendor advisory |
http://roundcube.net/news/2015/01/24/security-update-1.0.5/ | patch vendor advisory |
http://lists.opensuse.org/opensuse-updates/2015-02/msg00064.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2015/01/31/6 | mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149877.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2015/01/31/3 | mailing list |