CVE-2020-35730

medium

Description

An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.

References

https://www.helpnetsecurity.com/2024/08/07/cve-2024-42009-cve-2024-42008/

https://www.bleepingcomputer.com/news/security/cisa-roundcube-email-server-bug-now-exploited-in-attacks/

https://securityaffairs.com/155420/apt/apt8-exploited-outlook-0day-target-nato.html

https://web-assets.esetstatic.com/wls/en/papers/threat-reports/eset-apt-activity-report-q2-2023-q3-2023.pdf

https://www.bleepingcomputer.com/news/security/france-says-russian-state-hackers-breached-numerous-critical-networks/

https://www.bleepingcomputer.com/news/security/european-govt-email-servers-hacked-using-roundcube-zero-day/

https://thehackernews.com/2023/10/nation-state-hackers-exploiting-zero.html

https://www.alexbirnberg.com/roundcube-xss.html

https://roundcube.net/download/

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HMLIZWKMTRCLU7KZLEQHELS4INXJ7X5Q/

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCEU4BM5WGIDJWP6Z4PCH62ZMH57QYM2/

https://github.com/roundcube/roundcubemail/releases/tag/1.4.10

https://github.com/roundcube/roundcubemail/releases/tag/1.3.16

https://github.com/roundcube/roundcubemail/releases/tag/1.2.13

https://github.com/roundcube/roundcubemail/compare/1.4.9...1.4.10

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978491

Details

Source: Mitre, NVD

Published: 2020-12-28

Updated: 2024-06-27

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Severity: Medium