漏洞信息详情
Roundcube Webmail 跨站脚本漏洞
漏洞简介
Roundcube Webmail是一款基于浏览器的开源IMAP客户端,它支持地址薄管理、信息搜索、拼写检查等。
Roundcube Webmail 1.3.12之前版本和1.4.5之前的1.4.x版本中存在跨站脚本漏洞。该漏洞源于网络系统或产品未能正确地过滤资源或文件路径中的特殊元素。攻击者可利用该漏洞访问受限目录之外的位置。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12
参考网址
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/DLESQ4LPJGMSWHQ4TBRTVQRDG7IXAZCW/
来源:CONFIRM
链接:https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12
来源:MISC
链接:https://github.com/roundcube/roundcubemail/commit/884eb611627ef2bd5a2e20e02009ebb1eceecdc3
来源:MISC
链接:https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-13965-Cross%20Site-Scripting%20via%20Malicious%20XML%20Attachment-Roundcube
来源:MISC
链接:https://github.com/roundcube/roundcubemail/releases/tag/1.3.12
来源:MISC
链接:https://github.com/roundcube/roundcubemail/compare/1.4.4...1.4.5
来源:MISC
链接:https://github.com/roundcube/roundcubemail/releases/tag/1.4.5
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4700
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/ODPJXBHZ32QSP4MYT2OBCALYXSUJ47SK/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-13965
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2047/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Roundcube-Webmail-Cross-Site-Scripting-via-XML-Attachment-32524
受影响实体
暂无
补丁
- Roundcube Webmail 跨站脚本漏洞的修复措施<!--2020-6-8-->
还没有评论,来说两句吧...