Roundcube

Webmail

73 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.7%
  • Veröffentlicht 12.08.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:06:50

Roundcube Webmail before 1.3.15 and 1.4.8 allows stored XSS in HTML messages during message display via a crafted SVG document. This issue has been fixed in 1.4.8 and 1.3.15.

  • EPSS 0.86%
  • Veröffentlicht 06.07.2020 12:15:10
  • Zuletzt bearbeitet 21.11.2024 05:05:44

An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD ele...

Warnung Exploit
  • EPSS 73.79%
  • Veröffentlicht 09.06.2020 03:15:11
  • Zuletzt bearbeitet 04.11.2025 15:00:43

An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. There is XSS via a malicious XML attachment because text/xml is among the allowed types for a preview.

  • EPSS 0.87%
  • Veröffentlicht 09.06.2020 03:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:15

An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. include/rcmail_output_html.php allows XSS via the username template object.

Exploit
  • EPSS 22.66%
  • Veröffentlicht 04.05.2020 15:15:14
  • Zuletzt bearbeitet 21.11.2024 04:59:57

Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcube_plugin_api.php.

Warnung Exploit
  • EPSS 93.13%
  • Veröffentlicht 04.05.2020 15:15:14
  • Zuletzt bearbeitet 04.11.2025 15:00:56

rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.

Exploit
  • EPSS 1.29%
  • Veröffentlicht 04.05.2020 02:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:56

An issue was discovered in Roundcube Webmail before 1.4.4. A CSRF attack can cause an authenticated user to be logged out because POST was not considered.

Exploit
  • EPSS 2.31%
  • Veröffentlicht 04.05.2020 02:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:56

An issue was discovered in Roundcube Webmail before 1.4.4. There is a cross-site scripting (XSS) vulnerability in rcube_washtml.php because JavaScript code can occur in the CDATA of an HTML message.

  • EPSS 0.14%
  • Veröffentlicht 20.08.2019 01:15:09
  • Zuletzt bearbeitet 21.11.2024 04:28:15

Roundcube Webmail through 1.3.9 mishandles Punycode xn-- domain names, leading to homograph attacks.

Exploit
  • EPSS 0.17%
  • Veröffentlicht 07.04.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:19:49

In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This ...