#VU29609 Cross-site scripting in Roundcube - CVE-2020-15562
Published: July 9, 2020 / Updated: July 15, 2020
Roundcube
Roundcube
Description
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via a crafted HTML e-mail message with a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
External links
- https://github.com/roundcube/roundcubemail/commit/3e8832d029b035e3fcfb4c75839567a9580b4f82
- https://github.com/roundcube/roundcubemail/releases/tag/1.2.11
- https://github.com/roundcube/roundcubemail/releases/tag/1.3.14
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.7
- https://www.debian.org/security/2020/dsa-4720