Roundcube Webmail 1.5.x < 1.5.8 Multiples Vulnerabilities

critical Web App Scanning Plugin ID 114554

Synopsis

Roundcube Webmail 1.5.x < 1.5.8 Multiples Vulnerabilities

Description

According to its self-reported version number, Roundcube Webmail is prior to 1.5.8 or 1.6.x prior to 1.6.8. Therefore, it may be affected by multiple vulnerabilities :

- A Cross-Site Scripting (XSS) in rcmail_action_mail_get->run().

- A Cross-Site Scripting (XSS) via a crafted e-mail message that abuses a desanitization issue in message_body() in program/actions/mail/show.php.

- An Exposure of Sensitive Information through insufficiently filters Cascading Style Sheets (CSS) token sequences in rendered e-mail messages.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Roundcube Webmail version 1.5.8 or later.

See Also

https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8

Plugin Details

Severity: Critical

ID: 114554

Type: remote

Published: 1/17/2025

Updated: 1/17/2025

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: High

Score: 7.1

CVSS v2

Risk Factor: High

Base Score: 9.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N

CVSS Score Source: CVE-2024-42008

CVSS v3

Risk Factor: Critical

Base Score: 9.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

CVSS Score Source: CVE-2024-42008

Vulnerability Information

CPE: cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/4/2024

Vulnerability Publication Date: 8/4/2024

Reference Information

CVE: CVE-2024-42008, CVE-2024-42009, CVE-2024-42010