CVE-2011-2937

Cross-site scripting (XSS) vulnerability in the UI messages functionality in Roundcube Webmail before 0.5.4 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter to the default URI.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:alpha:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:beta:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:beta2:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:rc1:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:rc2:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.2:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.2:alpha:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.2:beta:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.3:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.3:beta:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.3:rc1:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.4:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.4:beta:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.5:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.5:beta:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.5:rc:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.5.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:29

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html - () http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html -
References () http://sourceforge.net/news/?group_id=139281&id=302769 - () http://sourceforge.net/news/?group_id=139281&id=302769 -
References () http://support.apple.com/kb/HT5130 - () http://support.apple.com/kb/HT5130 -
References () http://trac.roundcube.net/browser/tags/roundcubemail/v0.5.4/CHANGELOG - () http://trac.roundcube.net/browser/tags/roundcubemail/v0.5.4/CHANGELOG -
References () http://trac.roundcube.net/changeset/5037 - Patch () http://trac.roundcube.net/changeset/5037 - Patch
References () http://trac.roundcube.net/ticket/1488030 - Exploit, Patch () http://trac.roundcube.net/ticket/1488030 - Exploit, Patch
References () http://www.openwall.com/lists/oss-security/2011/08/18/5 - () http://www.openwall.com/lists/oss-security/2011/08/18/5 -
References () http://www.openwall.com/lists/oss-security/2011/08/19/15 - () http://www.openwall.com/lists/oss-security/2011/08/19/15 -
References () http://www.securityfocus.com/bid/49229 - () http://www.securityfocus.com/bid/49229 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=731786 - Exploit, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=731786 - Exploit, Patch

Information

Published : 2011-09-21 16:55

Updated : 2024-11-21 01:29


NVD link : CVE-2011-2937

Mitre link : CVE-2011-2937

CVE.ORG link : CVE-2011-2937


JSON object : View

Products Affected

roundcube

  • webmail
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')