Required CVE Record Information
Description
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.
References 6 Total
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.7
- https://github.com/roundcube/roundcubemail/releases/tag/1.3.14
- https://github.com/roundcube/roundcubemail/releases/tag/1.2.11
- https://github.com/roundcube/roundcubemail/commit/3e8832d029b035e3fcfb4c75839567a9580b4f82
- debian.org: DSA-4720 vendor-advisory
- lists.opensuse.org: openSUSE-SU-2020:1516 vendor-advisory
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 6 Total
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.7 x_transferred
- https://github.com/roundcube/roundcubemail/releases/tag/1.3.14 x_transferred
- https://github.com/roundcube/roundcubemail/releases/tag/1.2.11 x_transferred
- https://github.com/roundcube/roundcubemail/commit/3e8832d029b035e3fcfb4c75839567a9580b4f82 x_transferred
- debian.org: DSA-4720 vendor-advisoryx_transferred
- lists.opensuse.org: openSUSE-SU-2020:1516 vendor-advisoryx_transferred