steps/utils/modcss.inc in Roundcube Webmail before 0.5.1 does not properly verify that a request is an expected request for an external Cascading Style Sheets (CSS) stylesheet, which allows remote authenticated users to trigger arbitrary outbound TCP connections from the server, and possibly obtain sensitive information, via a crafted request.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://openwall.com/lists/oss-security/2011/03/24/3 - | |
References | () http://openwall.com/lists/oss-security/2011/03/24/4 - Patch | |
References | () http://openwall.com/lists/oss-security/2011/04/04/50 - Patch | |
References | () http://secunia.com/advisories/44050 - Vendor Advisory | |
References | () http://trac.roundcube.net/changeset/4488 - Patch | |
References | () http://trac.roundcube.net/wiki/Changelog - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/66613 - |
Information
Published : 2011-04-08 15:17
Updated : 2024-11-21 01:26
NVD link : CVE-2011-1492
Mitre link : CVE-2011-1492
CVE.ORG link : CVE-2011-1492
JSON object : View
Products Affected
roundcube
- webmail
CWE
CWE-20
Improper Input Validation