CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
41.0%
roundcube is vulnerable to Cross-Site Scripting (XSS). The vulnerability due to a content-type or content-disposition header. It allow an attacker could modify with malicious content-Type leads to cross site scripting.
github.com/roundcube/roundcubemail/commit/5ec496885e18ec6af956e8c0d627856c2257ba2d
github.com/roundcube/roundcubemail/releases/tag/1.5.6
github.com/roundcube/roundcubemail/releases/tag/1.6.5
lists.debian.org/debian-lts-announce/2023/12/msg00005.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GILSR762MJB3BNJOVOCMW2JXEPV46IIQ/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YFRGBPET73URF6364CI547ZVWQESJLGK/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z4F4DUA3Q46ZVB2RD7BFP4XMNS4RYFFQ/
security-tracker.debian.org/tracker/CVE-2023-47272
www.debian.org/security/2023/dsa-5572