Multiple cross-site scripting (XSS) vulnerabilities in Roundcube webmail before 0.9.3 allow user-assisted remote attackers to inject arbitrary web script or HTML via the body of a message visited in (1) new or (2) draft mode, related to compose.inc; and (3) might allow remote authenticated users to inject arbitrary web script or HTML via an HTML signature, related to save_identity.inc.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2013-09/msg00018.html - | |
References | () http://trac.roundcube.net/changeset/93b0a30c1c8aa29d862b587b31e52bcc344b8d16/github - Exploit, Patch | |
References | () http://trac.roundcube.net/changeset/ce5a6496fd6039962ba7424d153278e41ae8761b/github - Exploit, Patch | |
References | () http://trac.roundcube.net/ticket/1489251 - | |
References | () http://trac.roundcube.net/wiki/Changelog#RELEASE0.9.3 - |
Information
Published : 2013-08-29 12:07
Updated : 2024-11-21 01:57
NVD link : CVE-2013-5645
Mitre link : CVE-2013-5645
CVE.ORG link : CVE-2013-5645
JSON object : View
Products Affected
roundcube
- webmail
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')