Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8x8m-cq38-629v

Опубликовано: 04 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 4.3

Описание

In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.

In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.

EPSS

Процентиль: 40%
0.0018
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-319

Связанные уязвимости

CVSS3: 4.3
ubuntu
почти 7 лет назад

In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.

CVSS3: 4.3
nvd
почти 7 лет назад

In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.

CVSS3: 4.3
debian
почти 7 лет назад

In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIM ...

suse-cvrf
больше 3 лет назад

Security update for roundcubemail

suse-cvrf
больше 5 лет назад

Security update for roundcubemail

EPSS

Процентиль: 40%
0.0018
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-319