Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-19206

Опубликовано: 12 нояб. 2018
Источник: debian
EPSS Низкий

Описание

steps/mail/func.inc in Roundcube before 1.3.8 has XSS via crafted use of <svg><style>, as demonstrated by an onload attribute in a BODY element, within an HTML attachment.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
roundcubefixed1.3.8+dfsg.1-1package

Примечания

  • https://roundcube.net/news/2018/10/26/update-1.3.8-released

  • https://github.com/roundcube/roundcubemail/issues/6410

  • https://github.com/roundcube/roundcubemail/commit/102fbf1169116fef32a940b9fb1738bc45276059 (released-1.3)

  • https://github.com/roundcube/roundcubemail/commit/adcac3b9de2728c34c4d2b107e54823b6a7f6a5b (master)

EPSS

Процентиль: 84%
0.02357
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 7 лет назад

steps/mail/func.inc in Roundcube before 1.3.8 has XSS via crafted use of <svg><style>, as demonstrated by an onload attribute in a BODY element, within an HTML attachment.

CVSS3: 6.1
nvd
около 7 лет назад

steps/mail/func.inc in Roundcube before 1.3.8 has XSS via crafted use of <svg><style>, as demonstrated by an onload attribute in a BODY element, within an HTML attachment.

CVSS3: 6.1
github
больше 3 лет назад

steps/mail/func.inc in Roundcube before 1.3.8 has XSS via crafted use of <svg><style>, as demonstrated by an onload attribute in a BODY element, within an HTML attachment.

EPSS

Процентиль: 84%
0.02357
Низкий