CVE-2013-5645

Multiple cross-site scripting (XSS) vulnerabilities in Roundcube webmail before 0.9.3 allow user-assisted remote attackers to inject arbitrary web script or HTML via the body of a message visited in (1) new or (2) draft mode, related to compose.inc; and (3) might allow remote authenticated users to inject arbitrary web script or HTML via an HTML signature, related to save_identity.inc.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:20050811:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:20050820:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:20051007:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:20051021:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:alpha:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:beta:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:beta2:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:rc1:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:rc2:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1:stable:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.2:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.2:alpha:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.2:beta:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.2:stable:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.3:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.3:beta:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.3:rc1:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.3:stable:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.4:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.4:beta:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.5:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.5:beta:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.5:rc:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.6:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.7:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.9:beta:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.9:rc:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.9:rc2:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.9.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:57

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2013-09/msg00018.html - () http://lists.opensuse.org/opensuse-updates/2013-09/msg00018.html -
References () http://trac.roundcube.net/changeset/93b0a30c1c8aa29d862b587b31e52bcc344b8d16/github - Exploit, Patch () http://trac.roundcube.net/changeset/93b0a30c1c8aa29d862b587b31e52bcc344b8d16/github - Exploit, Patch
References () http://trac.roundcube.net/changeset/ce5a6496fd6039962ba7424d153278e41ae8761b/github - Exploit, Patch () http://trac.roundcube.net/changeset/ce5a6496fd6039962ba7424d153278e41ae8761b/github - Exploit, Patch
References () http://trac.roundcube.net/ticket/1489251 - () http://trac.roundcube.net/ticket/1489251 -
References () http://trac.roundcube.net/wiki/Changelog#RELEASE0.9.3 - () http://trac.roundcube.net/wiki/Changelog#RELEASE0.9.3 -

Information

Published : 2013-08-29 12:07

Updated : 2024-11-21 01:57


NVD link : CVE-2013-5645

Mitre link : CVE-2013-5645

CVE.ORG link : CVE-2013-5645


JSON object : View

Products Affected

roundcube

  • webmail
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')