Roundcube before 1.4.13 and 1.5.x before 1.5.2 allows XSS via an HTML e-mail message with crafted Cascading Style Sheets (CSS) token sequences.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/roundcube/roundcubemail/commit/8894fddd59b770399eed4ef8d4da5773913b5bf0 | third party advisory patch |
https://roundcube.net/news/2021/12/30/update-1.5.2-released | vendor advisory |
https://github.com/roundcube/roundcubemail/commit/b2400a4b592e3094b6c84e6000d512f99ae0eed8 | third party advisory patch |
https://roundcube.net/news/2021/12/30/security-update-1.4.13-released | vendor advisory |
https://bugs.debian.org/1003027 | vendor advisory |
https://www.debian.org/security/2022/dsa-5037 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/01/msg00005.html | third party advisory mailing list |