ALT-PU-2020-2367-1
Closed vulnerabilities
BDU:2020-03977
Уязвимость веб-почты для IMAP-серверов на основе AJAX Roundcube, связанная с недостатками используемых мер по защите структур веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-03988
Уязвимость почтового клиента RoundCube Webmail, связанная с недостатками используемых мер по защите структур веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-03989
Уязвимость почтового клиента RoundCube Webmail, связанная с недостатками используемых мер по защите структур веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-03991
Уязвимость решения для IMAP-серверов на основе AJAX Roundcube, связанная с недостатками механизмов противодействия межсайтовой фальсификации, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03992
Уязвимость решения для IMAP-серверов на основе AJAX Roundcube, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-04625
Уязвимость конфигурации smtp установщика почтового клиента Roundcube, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2020-12625
An issue was discovered in Roundcube Webmail before 1.4.4. There is a cross-site scripting (XSS) vulnerability in rcube_washtml.php because JavaScript code can occur in the CDATA of an HTML message.
- openSUSE-SU-2020:1516
- https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12625-Cross%20Site-Scripting%20via%20Malicious%20HTML%20Attachment-Roundcube
- https://github.com/roundcube/roundcubemail/commit/87e4cd0cf2c550e77586860b94e5c75d2b7686d0
- https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.4
- GLSA-202007-41
- DSA-4674
- openSUSE-SU-2020:1516
- DSA-4674
- GLSA-202007-41
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.4
- https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4
- https://github.com/roundcube/roundcubemail/commit/87e4cd0cf2c550e77586860b94e5c75d2b7686d0
- https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12625-Cross%20Site-Scripting%20via%20Malicious%20HTML%20Attachment-Roundcube
Modified: 2024-11-21
CVE-2020-12626
An issue was discovered in Roundcube Webmail before 1.4.4. A CSRF attack can cause an authenticated user to be logged out because POST was not considered.
- https://github.com/roundcube/roundcubemail/commit/9bbda422ff0b782b81de59c86994f1a5fd93f8e6
- https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4
- https://github.com/roundcube/roundcubemail/pull/7302
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.4
- GLSA-202007-41
- DSA-4674
- https://github.com/roundcube/roundcubemail/commit/9bbda422ff0b782b81de59c86994f1a5fd93f8e6
- DSA-4674
- GLSA-202007-41
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.4
- https://github.com/roundcube/roundcubemail/pull/7302
- https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4
Modified: 2024-11-21
CVE-2020-12640
Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcube_plugin_api.php.
- openSUSE-SU-2020:1516
- https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12640-PHP%20Local%20File%20Inclusion-Roundcube
- https://github.com/roundcube/roundcubemail/commit/814eadb699e8576ce3a78f21e95bf69a7c7b3794
- https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.4
- https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10
- GLSA-202007-41
- openSUSE-SU-2020:1516
- GLSA-202007-41
- https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.4
- https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4
- https://github.com/roundcube/roundcubemail/commit/814eadb699e8576ce3a78f21e95bf69a7c7b3794
- https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12640-PHP%20Local%20File%20Inclusion-Roundcube
Modified: 2025-03-14
CVE-2020-12641
rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
- openSUSE-SU-2020:1516
- https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12641-Command%20Injection-Roundcube
- https://github.com/roundcube/roundcubemail/commit/fcfb099477f353373c34c8a65c9035b06b364db3
- https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.4
- https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10
- GLSA-202007-41
- GLSA-202007-41
- https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.4
- https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4
- https://github.com/roundcube/roundcubemail/commit/fcfb099477f353373c34c8a65c9035b06b364db3
- https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12641-Command%20Injection-Roundcube
- openSUSE-SU-2020:1516
Modified: 2024-11-21
CVE-2020-13964
An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. include/rcmail_output_html.php allows XSS via the username template object.
- https://github.com/roundcube/roundcubemail/commit/37e2bc745723ef6322f0f785aefd0b9313a40f19
- https://github.com/roundcube/roundcubemail/releases/tag/1.3.12
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.5
- FEDORA-2020-2a1a6a8432
- FEDORA-2020-aeffd92b77
- https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12
- DSA-4700
- https://github.com/roundcube/roundcubemail/commit/37e2bc745723ef6322f0f785aefd0b9313a40f19
- DSA-4700
- https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12
- FEDORA-2020-aeffd92b77
- FEDORA-2020-2a1a6a8432
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.5
- https://github.com/roundcube/roundcubemail/releases/tag/1.3.12
Modified: 2025-02-13
CVE-2020-13965
An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. There is XSS via a malicious XML attachment because text/xml is among the allowed types for a preview.
- https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-13965-Cross%20Site-Scripting%20via%20Malicious%20XML%20Attachment-Roundcube
- https://github.com/roundcube/roundcubemail/commit/884eb611627ef2bd5a2e20e02009ebb1eceecdc3
- https://github.com/roundcube/roundcubemail/compare/1.4.4...1.4.5
- https://github.com/roundcube/roundcubemail/releases/tag/1.3.12
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.5
- FEDORA-2020-2a1a6a8432
- FEDORA-2020-aeffd92b77
- https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12
- DSA-4700
- https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-13965-Cross%20Site-Scripting%20via%20Malicious%20XML%20Attachment-Roundcube
- DSA-4700
- https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12
- FEDORA-2020-aeffd92b77
- FEDORA-2020-2a1a6a8432
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.5
- https://github.com/roundcube/roundcubemail/releases/tag/1.3.12
- https://github.com/roundcube/roundcubemail/compare/1.4.4...1.4.5
- https://github.com/roundcube/roundcubemail/commit/884eb611627ef2bd5a2e20e02009ebb1eceecdc3
Modified: 2024-11-21
CVE-2020-15562
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.
- openSUSE-SU-2020:1516
- openSUSE-SU-2020:1516
- https://github.com/roundcube/roundcubemail/commit/3e8832d029b035e3fcfb4c75839567a9580b4f82
- https://github.com/roundcube/roundcubemail/commit/3e8832d029b035e3fcfb4c75839567a9580b4f82
- https://github.com/roundcube/roundcubemail/releases/tag/1.2.11
- https://github.com/roundcube/roundcubemail/releases/tag/1.2.11
- https://github.com/roundcube/roundcubemail/releases/tag/1.3.14
- https://github.com/roundcube/roundcubemail/releases/tag/1.3.14
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.7
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.7
- DSA-4720
- DSA-4720
Modified: 2024-11-21
CVE-2020-18671
Cross Site Scripting (XSS) vulnerability in Roundcube Mail <=1.4.4 via smtp config in /installer/test.php.
- https://github.com/roundcube/roundcubemail/issues/7406
- https://github.com/roundcube/roundcubemail/issues/7406
- https://lorexxar.cn/2020/06/10/roundcube-mail-xss/#store-xss-in-smtp-config
- https://lorexxar.cn/2020/06/10/roundcube-mail-xss/#store-xss-in-smtp-config
- https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12
- https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12