A Cross-Site Scripting vulnerability in rcmail_action_mail_get->run() in
Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to
steal and send emails of a victim via a malicious e-mail attachment served
with a dangerous Content-Type header.
github.com/roundcube/roundcubemail/commit/89c8fe9ae9318c015807fbcbf7e39555fb30885d
github.com/roundcube/roundcubemail/releases
github.com/roundcube/roundcubemail/releases/tag/1.5.8
github.com/roundcube/roundcubemail/releases/tag/1.6.8
launchpad.net/bugs/cve/CVE-2024-42008
nvd.nist.gov/vuln/detail/CVE-2024-42008
roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8
security-tracker.debian.org/tracker/CVE-2024-42008
sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/
www.cve.org/CVERecord?id=CVE-2024-42008