A Cross-Site Scripting vulnerability in rcmail_action_mail_get->run() in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a malicious e-mail attachment served with a dangerous Content-Type header.
References
Link | Resource |
---|---|
https://github.com/roundcube/roundcubemail/releases | Release Notes |
https://github.com/roundcube/roundcubemail/releases/tag/1.5.8 | Release Notes |
https://github.com/roundcube/roundcubemail/releases/tag/1.6.8 | Release Notes |
https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8 | Vendor Advisory |
https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ | Technical Description |
Configurations
Configuration 1 (hide)
|
History
06 Sep 2024, 21:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:* | |
First Time |
Roundcube
Roundcube webmail |
|
CWE | CWE-79 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.3 |
References | () https://github.com/roundcube/roundcubemail/releases - Release Notes | |
References | () https://github.com/roundcube/roundcubemail/releases/tag/1.5.8 - Release Notes | |
References | () https://github.com/roundcube/roundcubemail/releases/tag/1.6.8 - Release Notes | |
References | () https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8 - Vendor Advisory | |
References | () https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/ - Technical Description |
06 Aug 2024, 16:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Aug 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-05 19:15
Updated : 2024-09-06 21:48
NVD link : CVE-2024-42008
Mitre link : CVE-2024-42008
CVE.ORG link : CVE-2024-42008
JSON object : View
Products Affected
roundcube
- webmail
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')