SMTP RULE(RULE ID:505884)

Rule General Information
Release Date: 2024-05-11
Rule Name: Roundcube Webmail rcube_washtml.php Cross-Site Scripting Vulnerability (CVE-2023-5631)
Severity: Medium
CVE ID: CVE-2023-5631
Rule Protection Details
Description: Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attackerto load arbitrary JavaScript code.
Impact: An attacker can conduct a cross-site scripting attack to inject malicious client-side scripts into web pages viewed by other users, or to bypass access controls such as the same-origin policy, if affected version is installed.
Affected OS: Windows, Linux, Others
Reference: http://www.openwall.com/lists/oss-security/2023/11/01/1
http://www.openwall.com/lists/oss-security/2023/11/01/3
http://www.openwall.com/lists/oss-security/2023/11/17/2
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054079
Solutions
Refer to the announcement or patch by the vendor: https://github.com/roundcube/roundcubemail/commit/6ee6e7ae301e165e2b2cb703edf75552e5376613