CVE-2015-1433
Published: 3 February 2015
program/lib/Roundcube/rcube_washtml.php in Roundcube before 1.0.5 does not properly quote strings, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the style attribute in an email.
Priority
Status
Package | Release | Status |
---|---|---|
roundcube Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(0.9.5+dfsg1-4.2)
|
bionic |
Not vulnerable
(1.3.6+dfsg.1-1)
|
|
cosmic |
Not vulnerable
(1.3.6+dfsg.1-1)
|
|
disco |
Not vulnerable
(1.3.6+dfsg.1-1)
|
|
lucid |
Ignored
(end of life)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(0.9.5+dfsg1-4.2)
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Not vulnerable
(0.9.5+dfsg1-4.2)
|
|
wily |
Not vulnerable
(0.9.5+dfsg1-4.2)
|
|
xenial |
Not vulnerable
(0.9.5+dfsg1-4.2)
|
|
yakkety |
Not vulnerable
(0.9.5+dfsg1-4.2)
|
|
zesty |
Not vulnerable
(0.9.5+dfsg1-4.2)
|
References
- http://www.openwall.com/lists/oss-security/2015/01/31/6
- http://www.openwall.com/lists/oss-security/2015/01/31/3
- http://trac.roundcube.net/ticket/1490227
- http://trac.roundcube.net/changeset/786aa0725/github
- http://roundcube.net/news/2015/01/24/security-update-1.0.5/
- https://www.cve.org/CVERecord?id=CVE-2015-1433
- NVD
- Launchpad
- Debian