An issue was discovered in Roundcube Webmail before 1.4.4. A CSRF attack can cause an authenticated user to be logged out because POST was not considered.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://github.com/roundcube/roundcubemail/releases/tag/1.4.4 | third party advisory |
https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4 | third party advisory patch |
https://github.com/roundcube/roundcubemail/pull/7302 | issue tracking patch exploit third party advisory |
https://github.com/roundcube/roundcubemail/commit/9bbda422ff0b782b81de59c86994f1a5fd93f8e6 | third party advisory patch |
https://www.debian.org/security/2020/dsa-4674 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/202007-41 | third party advisory vendor advisory |