OoO En cette nuit nuageuse du jeudi 05 février 2009, vers 00:13, Steffen
Joeris <steffen.joe...@skolelinux.de> disait :

> Package: roundcube
> Version: 0.2~alpha-4
> Severity: important
> Tags: security

> Hi,
> the following CVE (Common Vulnerabilities & Exposures) id was
> published for roundcube.

> CVE-2009-0413[0]:
> | Cross-site scripting (XSS) vulnerability in RoundCube Webmail
> | (roundcubemail) 0.2 stable allows remote attackers to inject arbitrary
> | web script or HTML via the background attribute embedded in an HTML
> | e-mail message.

> This bugreport concerns the experimental version. The other versions
> don't seem to be affected after a quick glance. The published upstream
> patch is here[1].

> If you fix the vulnerability please also make sure to include the
> CVE id in your changelog entry.

Hi Steffen!

From  my knowledge,  0.1.1 and  0.2alpha  are not  affected because  the
background attribute is not accepted at all.

The patch also fixes  a regexp and I don't know if  this is related to a
security issue. I will ask upstream about this.

Until  I get  a confirmation,  I leave  the report  as is.  I  hope that
roundcube won't be removed from lenny. ;-)

Thanks for the report.
-- 
BOFH excuse #328:
Fiber optics caused gas main leak

Attachment: pgpjlvfB4fN9j.pgp
Description: PGP signature

Reply via email to