Roundcube

Webmail

71 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung Exploit
  • EPSS 82.69%
  • Veröffentlicht 09.06.2020 03:15:11
  • Zuletzt bearbeitet 04.11.2025 15:00:43

An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. There is XSS via a malicious XML attachment because text/xml is among the allowed types for a preview.

  • EPSS 0.87%
  • Veröffentlicht 09.06.2020 03:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:15

An issue was discovered in Roundcube Webmail before 1.3.12 and 1.4.x before 1.4.5. include/rcmail_output_html.php allows XSS via the username template object.

Warnung Exploit
  • EPSS 93.28%
  • Veröffentlicht 04.05.2020 15:15:14
  • Zuletzt bearbeitet 04.11.2025 15:00:56

rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.

Exploit
  • EPSS 22.66%
  • Veröffentlicht 04.05.2020 15:15:14
  • Zuletzt bearbeitet 21.11.2024 04:59:57

Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcube_plugin_api.php.

Exploit
  • EPSS 1.29%
  • Veröffentlicht 04.05.2020 02:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:56

An issue was discovered in Roundcube Webmail before 1.4.4. A CSRF attack can cause an authenticated user to be logged out because POST was not considered.

Exploit
  • EPSS 2.31%
  • Veröffentlicht 04.05.2020 02:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:56

An issue was discovered in Roundcube Webmail before 1.4.4. There is a cross-site scripting (XSS) vulnerability in rcube_washtml.php because JavaScript code can occur in the CDATA of an HTML message.

  • EPSS 0.14%
  • Veröffentlicht 20.08.2019 01:15:09
  • Zuletzt bearbeitet 21.11.2024 04:28:15

Roundcube Webmail through 1.3.9 mishandles Punycode xn-- domain names, leading to homograph attacks.

Exploit
  • EPSS 0.18%
  • Veröffentlicht 07.04.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:19:49

In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This ...

  • EPSS 2.36%
  • Veröffentlicht 12.11.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:57:33

steps/mail/func.inc in Roundcube before 1.3.8 has XSS via crafted use of <svg><style>, as demonstrated by an onload attribute in a BODY element, within an HTML attachment.

  • EPSS 0.32%
  • Veröffentlicht 12.11.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:57:33

Roundcube before 1.3.7 mishandles GnuPG MDC integrity-protection warnings, which makes it easier for attackers to obtain sensitive information, a related issue to CVE-2017-17688. This is associated with plugins/enigma/lib/enigma_driver_gnupg.php.