Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r646-w9ph-62w9

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

steps/utils/modcss.inc in Roundcube Webmail before 0.5.1 does not properly verify that a request is an expected request for an external Cascading Style Sheets (CSS) stylesheet, which allows remote authenticated users to trigger arbitrary outbound TCP connections from the server, and possibly obtain sensitive information, via a crafted request.

steps/utils/modcss.inc in Roundcube Webmail before 0.5.1 does not properly verify that a request is an expected request for an external Cascading Style Sheets (CSS) stylesheet, which allows remote authenticated users to trigger arbitrary outbound TCP connections from the server, and possibly obtain sensitive information, via a crafted request.

EPSS

Процентиль: 59%
0.0039
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 14 лет назад

steps/utils/modcss.inc in Roundcube Webmail before 0.5.1 does not properly verify that a request is an expected request for an external Cascading Style Sheets (CSS) stylesheet, which allows remote authenticated users to trigger arbitrary outbound TCP connections from the server, and possibly obtain sensitive information, via a crafted request.

nvd
больше 14 лет назад

steps/utils/modcss.inc in Roundcube Webmail before 0.5.1 does not properly verify that a request is an expected request for an external Cascading Style Sheets (CSS) stylesheet, which allows remote authenticated users to trigger arbitrary outbound TCP connections from the server, and possibly obtain sensitive information, via a crafted request.

debian
больше 14 лет назад

steps/utils/modcss.inc in Roundcube Webmail before 0.5.1 does not prop ...

EPSS

Процентиль: 59%
0.0039
Низкий

Дефекты

CWE-20