header-logo
Suggest Exploit
vendor:
RoundCube Webmail
by:
Unknown
5.5
CVSS
MEDIUM
Cross-Site Scripting
79
CWE
Product Name: RoundCube Webmail
Affected Version From: All versions prior to the latest version
Affected Version To: Latest version
Patch Exists: YES
Related CWE:
CPE: a:roundcube:roundcube_webmail
Metasploit:
Other Scripts:
Platforms Tested: All platforms
2020

Cross-Site Scripting Vulnerability in RoundCube Webmail

RoundCube Webmail is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Mitigation:

To mitigate this vulnerability, it is recommended to update RoundCube Webmail to the latest version, which includes a fix for this issue. Additionally, input validation and output encoding should be implemented to properly sanitize user-supplied data.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/37654/info

RoundCube Webmail is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

http://www.example.com/program/steps/error.inc?ERROR_CODE=601&ERROR_MESSAGE=123