Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-5631

Опубликовано: 18 окт. 2023
Источник: debian
EPSS Высокий

Описание

Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
roundcubefixed1.6.4+dfsg-1package

Примечания

  • https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d (1.6.4)

  • https://www.openwall.com/lists/oss-security/2023/11/01/1

EPSS

Процентиль: 99%
0.84417
Высокий

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 2 лет назад

Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.

CVSS3: 6.1
nvd
около 2 лет назад

Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.

suse-cvrf
около 2 лет назад

Security update for roundcubemail

CVSS3: 5.4
redos
около 2 лет назад

Уязвимость Roundcube

CVSS3: 6.1
github
около 2 лет назад

Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.

EPSS

Процентиль: 99%
0.84417
Высокий