Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube before 1.0.6 and 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter in a mail task to the default URL, a different vulnerability than CVE-2011-2937.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released/ | patch vendor advisory |
http://trac.roundcube.net/ticket/1490417 | patch issue tracking exploit |
http://trac.roundcube.net/wiki/Changelog#RELEASE1.1.2 | release notes |