← Voltar para CVEs
CVE-2023-5631
MEDIUMCISA KEV6.1
Descricao
Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.
Detalhes CVE
Pontuacao CVSS v3.16.1
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioREQUIRED
Publicado10/18/2023
Ultima modificacao10/30/2025
Fontekev
Avistamentos honeypot0
CISA KEV
FornecedorRoundcube
ProdutoWebmail
Nome da vulnerabilidadeRoundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability
Data inclusao KEV2023-10-26
Prazo de remediacao2023-11-16
Uso em ransomwareUnknown
Produtos afetados
debian:debian_linuxfedoraproject:fedoraroundcube:webmail
Fraquezas (CWE)
CWE-79CWE-79
Referencias
http://www.openwall.com/lists/oss-security/2023/11/01/1(security@eset.com)
http://www.openwall.com/lists/oss-security/2023/11/01/3(security@eset.com)
http://www.openwall.com/lists/oss-security/2023/11/17/2(security@eset.com)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054079(security@eset.com)
https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d(security@eset.com)
https://github.com/roundcube/roundcubemail/commit/6ee6e7ae301e165e2b2cb703edf75552e5376613(security@eset.com)
https://github.com/roundcube/roundcubemail/issues/9168(security@eset.com)
https://github.com/roundcube/roundcubemail/releases/tag/1.4.15(security@eset.com)
https://github.com/roundcube/roundcubemail/releases/tag/1.5.5(security@eset.com)
https://github.com/roundcube/roundcubemail/releases/tag/1.6.4(security@eset.com)
https://lists.debian.org/debian-lts-announce/2023/10/msg00035.html(security@eset.com)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LK67Q46OIEGJCRQUBHKLH3IIJTBNGGX4/(security@eset.com)
https://roundcube.net/news/2023/10/16/security-update-1.6.4-released(security@eset.com)
https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15(security@eset.com)
https://www.debian.org/security/2023/dsa-5531(security@eset.com)
http://www.openwall.com/lists/oss-security/2023/11/01/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2023/11/01/3(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2023/11/17/2(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054079(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/roundcube/roundcubemail/commit/6ee6e7ae301e165e2b2cb703edf75552e5376613(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/roundcube/roundcubemail/issues/9168(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/roundcube/roundcubemail/releases/tag/1.4.15(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/roundcube/roundcubemail/releases/tag/1.5.5(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/roundcube/roundcubemail/releases/tag/1.6.4(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/10/msg00035.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LK67Q46OIEGJCRQUBHKLH3IIJTBNGGX4/(af854a3a-2127-422b-91ae-364da2661108)
https://roundcube.net/news/2023/10/16/security-update-1.6.4-released(af854a3a-2127-422b-91ae-364da2661108)
https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2023/dsa-5531(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-5631(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.