Vulnerability CVE-2020-35730


Published: 2020-12-28

Description:
An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Roundcube -> Roundcube 

 References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978491
https://github.com/roundcube/roundcubemail/compare/1.4.9...1.4.10
https://github.com/roundcube/roundcubemail/releases/tag/1.2.13
https://github.com/roundcube/roundcubemail/releases/tag/1.3.16
https://github.com/roundcube/roundcubemail/releases/tag/1.4.10
https://roundcube.net/download/
https://www.alexbirnberg.com/roundcube-xss.html

Copyright 2024, cxsecurity.com

 

Back to Top