Upstream information

CVE-2024-42009 at MITRE

Description

A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having critical severity.

CVSS v3 Scores
  National Vulnerability Database
Base Score 9.3
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Changed
Confidentiality Impact High
Integrity Impact High
Availability Impact None
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1228900 [NEW]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP5
  • roundcubemail >= 1.6.8-bp155.2.12.1
Patchnames:
openSUSE-2024-328
SUSE Package Hub 15 SP6
  • roundcubemail >= 1.6.8-bp156.2.3.1
Patchnames:
openSUSE-2024-328
openSUSE Leap 15.5
  • roundcubemail >= 1.6.8-bp155.2.12.1
Patchnames:
openSUSE-2024-328
openSUSE Leap 15.6
  • roundcubemail >= 1.6.8-bp156.2.3.1
Patchnames:
openSUSE-2024-328
openSUSE Tumbleweed
  • roundcubemail >= 1.6.8-1.1
Patchnames:
openSUSE-Tumbleweed-2024-14243


SUSE Timeline for this CVE

CVE page created: Mon Aug 5 22:00:16 2024
CVE page last modified: Wed Oct 9 18:00:41 2024