An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/roundcube/roundcubemail/releases/tag/1.4.7 | third party advisory release notes |
https://github.com/roundcube/roundcubemail/releases/tag/1.3.14 | third party advisory release notes |
https://github.com/roundcube/roundcubemail/releases/tag/1.2.11 | third party advisory release notes |
https://github.com/roundcube/roundcubemail/commit/3e8832d029b035e3fcfb4c75839567a9580b4f82 | third party advisory patch |
https://www.debian.org/security/2020/dsa-4720 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html | vendor advisory broken link |