Hi,

On Thu, Nov 18, 2021 at 07:25:02PM +0100, Guilhem Moulin wrote:
> Source: roundcube
> Severity: important
> Tags: security
> Control: found -1 1.3.16+dfsg.1-1~deb10u1
> Control: found -1 1.4.11+dfsg.1-4
> Control: fixed -1 1.5.0+dfsg.1-1
> 
> In a recent post roundcube webmail upstream has announced the
> following security fixes:
> 
>  * Fix XSS issue in handling attachment filename extension in mimetype
>    mismatch warning
>  * Fix possible SQL injection via some session variables
> 
> sid/bookworm's 1.5.0+dfsg.1-2 is not affected.  Upstream fixes for LTS
> branches:
> 
>     1.4.x 
> https://github.com/roundcube/roundcubemail/commit/faf99bf8a2b7b7562206fa047e8de652861e624a
>           
> https://github.com/roundcube/roundcubemail/commit/c8947ecb762d9e89c2091bda28d49002817263f1
>     1.3.x 
> https://github.com/roundcube/roundcubemail/commit/7d7b1dfeff795390b69905ceb63d6391b5b0dfe7
>           
> https://github.com/roundcube/roundcubemail/commit/ee809bde2dcaa04857a919397808a7296681dcfa

CVEs are assigned as follows (by MITRE):

CVE-2021-44025 for th XSS issue

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44025

CVE-2021-44026 for the SQL injection.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44026

Regards,
Salvatore

Reply via email to