Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube before 1.0.6 and 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter in a mail task to the default URL, a different vulnerability than CVE-2011-2937.
References
Link | Resource |
---|---|
http://trac.roundcube.net/ticket/1490417 | Exploit Issue Tracking Patch |
http://trac.roundcube.net/wiki/Changelog#RELEASE1.1.2 | Release Notes |
https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released/ | Patch Vendor Advisory |
http://trac.roundcube.net/ticket/1490417 | Exploit Issue Tracking Patch |
http://trac.roundcube.net/wiki/Changelog#RELEASE1.1.2 | Release Notes |
https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released/ | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://trac.roundcube.net/ticket/1490417 - Exploit, Issue Tracking, Patch | |
References | () http://trac.roundcube.net/wiki/Changelog#RELEASE1.1.2 - Release Notes | |
References | () https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released/ - Patch, Vendor Advisory |
Information
Published : 2016-01-29 19:59
Updated : 2024-11-21 02:39
NVD link : CVE-2015-8793
Mitre link : CVE-2015-8793
CVE.ORG link : CVE-2015-8793
JSON object : View
Products Affected
roundcube
- webmail
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')