|
|||
Rule General Information |
---|
Release Date: | 2024-05-11 | |
Rule Name: | Roundcube Webmail rcube_washtml.php Cross-Site Scripting Vulnerability (CVE-2023-5631) | |
Severity: | Medium | |
CVE ID: | CVE-2023-5631 | |
Rule Protection Details |
---|
Description: | Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attackerto load arbitrary JavaScript code. | |
Impact: | An attacker can conduct a cross-site scripting attack to inject malicious client-side scripts into web pages viewed by other users, or to bypass access controls such as the same-origin policy, if affected version is installed. | |
Affected OS: | Windows, Linux, Others | |
Reference: | http://www.openwall.com/lists/oss-security/2023/11/01/1 http://www.openwall.com/lists/oss-security/2023/11/01/3 http://www.openwall.com/lists/oss-security/2023/11/17/2 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054079 |
|
Solutions |
---|
Refer to the announcement or patch by the vendor: https://github.com/roundcube/roundcubemail/commit/6ee6e7ae301e165e2b2cb703edf75552e5376613 |