Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows
XSS via a text/html e-mail message containing an SVG image with a USE
element. This is related to wash_uri in rcube_washtml.php.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 16.04 | noarch | roundcube | < any | UNKNOWN |
ubuntu | 18.04 | noarch | roundcube | < any | UNKNOWN |
ubuntu | 20.04 | noarch | roundcube | < any | UNKNOWN |
ubuntu | 22.04 | noarch | roundcube | < any | UNKNOWN |
ubuntu | upstream | noarch | roundcube | < any | UNKNOWN |
ubuntu | upstream | noarch | roundcube | < any | UNKNOWN |
ubuntu | upstream | noarch | roundcube | < any | UNKNOWN |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46267
github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d
github.com/roundcube/roundcubemail/compare/1.4.14...1.4.15
github.com/roundcube/roundcubemail/compare/1.5.4...1.5.5
github.com/roundcube/roundcubemail/issues/9168
launchpad.net/bugs/cve/CVE-2023-46267
nvd.nist.gov/vuln/detail/CVE-2023-46267
roundcube.net/news/2023/10/16/security-update-1.6.4-released
roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15
security-tracker.debian.org/tracker/CVE-2023-46267