An issue was discovered in Roundcube Webmail before 1.4.4. There is a cross-site scripting (XSS) vulnerability in rcube_washtml.php because JavaScript code can occur in the CDATA of an HTML message.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 9.0 | |
debian_linux | eq | 10.0 | |
backports_sle | eq | 15.0 sp1 | |
backports_sle | eq | 15.0 sp2 | |
leap | eq | 15.1 | |
leap | eq | 15.2 | |
webmail | lt | 1.4.4 |
lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html
github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12625-Cross%20Site-Scripting%20via%20Malicious%20HTML%20Attachment-Roundcube
github.com/roundcube/roundcubemail/commit/87e4cd0cf2c550e77586860b94e5c75d2b7686d0
github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4
github.com/roundcube/roundcubemail/releases/tag/1.4.4
security.gentoo.org/glsa/202007-41
www.debian.org/security/2020/dsa-4674