Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8793

Опубликовано: 29 янв. 2016
Источник: debian

Описание

Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube before 1.0.6 and 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter in a mail task to the default URL, a different vulnerability than CVE-2011-2937.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
roundcubefixed1.1.2+dfsg.1-1package
roundcubenot-affectedwheezypackage
roundcubenot-affectedsqueezepackage

Примечания

  • http://web.archive.org/web/20160329044745/http://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released

  • http://www.scip.ch/en/?vuldb.80731

  • http://trac.roundcube.net/ticket/1490417 - mentions 1.0 not vulnerable, verified code not present in squeeze

  • http://web.archive.org/web/20150627125240/http://trac.roundcube.net:80/changeset/b782815dac/github

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 10 лет назад

Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube before 1.0.6 and 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter in a mail task to the default URL, a different vulnerability than CVE-2011-2937.

CVSS3: 6.1
nvd
около 10 лет назад

Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube before 1.0.6 and 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter in a mail task to the default URL, a different vulnerability than CVE-2011-2937.

CVSS3: 6.1
github
больше 3 лет назад

Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube before 1.0.6 and 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter in a mail task to the default URL, a different vulnerability than CVE-2011-2937.