A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/roundcube/roundcubemail/releases | release notes |
https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ | technical description |
https://github.com/roundcube/roundcubemail/releases/tag/1.5.8 | release notes |
https://github.com/roundcube/roundcubemail/releases/tag/1.6.8 | release notes |
https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8 | vendor advisory |