[wptb id="118357" not found ]
Vulnerability Details:
- Vulnerability Name: Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability.
- Products Affected: Roundcube Webmail.
- Vulnerability Type: Cross-Site Scripting (XSS).
- CVE # : CVE-2023-43770.
- CWE-ID: CWE-79.
- CWE Name: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’).
- Severity: 6.1 MEDIUM
- Required Action: Update all productive installations of Roundcube 1.6.x with the new version published.
The National Institute of Standards and Technology (NIST) National Vulnerability Database published details about a security flaw, identified as CVE-2023-43770, affecting Roundcube Webmail. This vulnerability, scored at 6.1 Medium, allows for cross-site scripting (XSS) attacks through crafted links in text/plain email messages. Specifically, versions before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 are susceptible to XSS exploitation due to the behavior of the program/lib/Roundcube/rcube_string_replacer.php component.
The security issue presents a persistent XSS risk within Roundcube Webmail, potentially leading to the disclosure of sensitive information through malicious link references embedded in plain text messages. To address this vulnerability, Roundcube has released a security update to version 1.6 of the webmail platform. This update aims to fix the XSS vulnerability reported by Niraj Shivtarkar, enhancing the security posture of Roundcube Webmail installations against potential exploitation.
With the release of Roundcube Webmail version 1.6.3, users are urged to promptly update their installations to mitigate the risk of XSS attacks. This security patch addresses the underlying vulnerability in the handling of link references within plain text messages, providing a safeguard against potential exploitation by malicious actors. By applying this update, organizations using Roundcube Webmail can enhance their defenses and protect their systems from the identified security risk.