Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.853450
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for roundcubemail (openSUSE-SU-2020:1516-1)
Summary:The remote host is missing an update for the 'roundcubemail'; package(s) announced via the openSUSE-SU-2020:1516-1 advisory.
Description:Summary:
The remote host is missing an update for the 'roundcubemail'
package(s) announced via the openSUSE-SU-2020:1516-1 advisory.

Vulnerability Insight:
This update for roundcubemail fixes the following issues:

roundcubemail was upgraded to 1.3.15

This is a security update to the LTS version 1.3. (boo#1175135)

* Security: Fix cross-site scripting (XSS) via HTML messages with
malicious svg content [CVE-2020-16145]

* Security: Fix cross-site scripting (XSS) via HTML messages with
malicious math content

From 1.3.14 (boo#1173792 -> CVE-2020-15562)

* Security: Fix cross-site scripting (XSS) via HTML messages with
malicious svg/namespace

From 1.3.13

* Installer: Fix regression in SMTP test section (#7417)

From 1.3.12

* Security: Better fix for CVE-2020-12641 (boo#1171148)

* Security: Fix XSS issue in template object 'username' (#7406)

* Security: Fix couple of XSS issues in Installer (#7406)

* Security: Fix cross-site scripting (XSS) via malicious XML attachment

From 1.3.11 (boo#1171148 -> CVE-2020-12641 boo#1171040 -> CVE-2020-12625
boo#1171149 -> CVE-2020-12640)

* Enigma: Fix compatibility with Mail_Mime >= 1.10.5

* Fix permissions on some folders created by bin/install-jsdeps.sh
script (#6930)

* Fix bug where inline images could have been ignored if Content-Id
header contained redundant spaces (#6980)

* Fix PHP Warning: Use of undefined constant LOG_EMERGE (#6991)

* Fix PHP warning: 'array_merge(): Expected parameter 2 to be an array,
null given in sendmail.inc (#7003)

* Security: Fix XSS issue in handling of CDATA in HTML messages

* Security: Fix remote code execution via crafted 'im_convert_path' or
'im_identify_path' settings

* Security: Fix local file inclusion (and code execution) via crafted
'plugins' option

* Security: Fix CSRF bypass that could be used to log out an
authenticated user (#7302)

From 1.3.10 (boo#1146286)

* Managesieve: Fix so 'Create filter' option does not show up when
Filters menu is disabled (#6723)

* Enigma: Fix bug where revoked users/keys were not greyed out in key
info

* Enigma: Fix error message when trying to encrypt with a revoked key
(#6607)

* Enigma: Fix 'decryption oracle' bug [CVE-2019-10740] (#6638)

* Fix compatibility with kolab/net_ldap3 > 1.0.7 (#6785)

* Fix bug where bmp images couldn't be displayed on some systems (#6728)

* Fix bug in parsing vCard data using PHP 7.3 due to an invalid regexp
(#6744)

* Fix bug where bold/strong text was converted to upper-case on
html-to-text conversion (6758)

* Fix bug in rcube_utils::parse_hosts() where %t, %d, %z could return
only tld (#6746)

* Fix bug where Next/Prev button in mail view didn't work with
multi-folder search ...

Description truncated. Please see the references for more information.

Affected Software/OS:
'roundcubemail' package(s) on openSUSE Leap 15.2, openSUSE Leap 15.1.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-10740
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFFMSO5WKEYSGMTZPZFF4ZADUJ57PRN5/
https://github.com/roundcube/roundcubemail/issues/6638
SuSE Security Announcement: openSUSE-SU-2020:1516 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-12625
Debian Security Information: DSA-4674 (Google Search)
https://www.debian.org/security/2020/dsa-4674
https://security.gentoo.org/glsa/202007-41
https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12625-Cross%20Site-Scripting%20via%20Malicious%20HTML%20Attachment-Roundcube
https://github.com/roundcube/roundcubemail/commit/87e4cd0cf2c550e77586860b94e5c75d2b7686d0
https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4
https://github.com/roundcube/roundcubemail/releases/tag/1.4.4
Common Vulnerability Exposure (CVE) ID: CVE-2020-12640
https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12640-PHP%20Local%20File%20Inclusion-Roundcube
https://github.com/roundcube/roundcubemail/commit/814eadb699e8576ce3a78f21e95bf69a7c7b3794
https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10
Common Vulnerability Exposure (CVE) ID: CVE-2020-12641
https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12641-Command%20Injection-Roundcube
https://github.com/roundcube/roundcubemail/commit/fcfb099477f353373c34c8a65c9035b06b364db3
Common Vulnerability Exposure (CVE) ID: CVE-2020-15562
Debian Security Information: DSA-4720 (Google Search)
https://www.debian.org/security/2020/dsa-4720
https://github.com/roundcube/roundcubemail/commit/3e8832d029b035e3fcfb4c75839567a9580b4f82
https://github.com/roundcube/roundcubemail/releases/tag/1.2.11
https://github.com/roundcube/roundcubemail/releases/tag/1.3.14
https://github.com/roundcube/roundcubemail/releases/tag/1.4.7
Common Vulnerability Exposure (CVE) ID: CVE-2020-16145
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBLUQRIBAMEQVBO6GUZECCHJDJIWCYFU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DAXK3565NYK4OEZVTW6S5LEVIDQEY2E/
https://github.com/roundcube/roundcubemail/commit/d44ca2308a96576b88d6bf27528964d4fe1a6b8b#diff-d3bb3391c79904494c60ee2ac2f33070
https://github.com/roundcube/roundcubemail/releases/tag/1.4.8
CopyrightCopyright (C) 2020 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.