Vulnerability Description
Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Roundcube | Webmail | < 1.4.15 |
| Debian | Debian Linux | 10.0 |
| Fedoraproject | Fedora | 39 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2023/11/01/1Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2023/11/01/3Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2023/11/17/2Mailing ListThird Party Advisory
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054079Mailing ListPatch
- https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474Patch
- https://github.com/roundcube/roundcubemail/commit/6ee6e7ae301e165e2b2cb703edf755Patch
- https://github.com/roundcube/roundcubemail/issues/9168ExploitIssue Tracking
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.15Release Notes
- https://github.com/roundcube/roundcubemail/releases/tag/1.5.5Release Notes
- https://github.com/roundcube/roundcubemail/releases/tag/1.6.4Release Notes
- https://lists.debian.org/debian-lts-announce/2023/10/msg00035.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing List
- https://roundcube.net/news/2023/10/16/security-update-1.6.4-releasedRelease Notes
- https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15Release Notes
- https://www.debian.org/security/2023/dsa-5531Mailing List
FAQ
What is CVE-2023-5631?
CVE-2023-5631 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior...
How severe is CVE-2023-5631?
CVE-2023-5631 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5631?
Check the references section above for vendor advisories and patch information. Affected products include: Roundcube Webmail, Debian Debian Linux, Fedoraproject Fedora.