Vulnerability Description
A Cross-Site Scripting vulnerability in rcmail_action_mail_get->run() in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a malicious e-mail attachment served with a dangerous Content-Type header.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Roundcube | Webmail | < 1.5.8 |
Related Weaknesses (CWE)
References
- https://github.com/roundcube/roundcubemail/releasesRelease Notes
- https://github.com/roundcube/roundcubemail/releases/tag/1.5.8Release Notes
- https://github.com/roundcube/roundcubemail/releases/tag/1.6.8Release Notes
- https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8Vendor Advisory
- https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripTechnical Description
FAQ
What is CVE-2024-42008?
CVE-2024-42008 is a vulnerability with a CVSS score of 9.3 (CRITICAL). A Cross-Site Scripting vulnerability in rcmail_action_mail_get->run() in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a malicious e...
How severe is CVE-2024-42008?
CVE-2024-42008 has been rated CRITICAL with a CVSS base score of 9.3/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-42008?
Check the references section above for vendor advisories and patch information. Affected products include: Roundcube Webmail.