{"id":"BIT-roundcube-2020-35730","details":"An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.","aliases":["CVE-2020-35730"],"modified":"2024-03-06T11:25:28.861Z","published":"2024-03-06T11:04:55.170Z","database_specific":{"severity":"Medium","cpes":["cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978491"},{"type":"WEB","url":"https://github.com/roundcube/roundcubemail/compare/1.4.9...1.4.10"},{"type":"WEB","url":"https://github.com/roundcube/roundcubemail/releases/tag/1.2.13"},{"type":"WEB","url":"https://github.com/roundcube/roundcubemail/releases/tag/1.3.16"},{"type":"WEB","url":"https://github.com/roundcube/roundcubemail/releases/tag/1.4.10"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCEU4BM5WGIDJWP6Z4PCH62ZMH57QYM2/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HMLIZWKMTRCLU7KZLEQHELS4INXJ7X5Q/"},{"type":"WEB","url":"https://roundcube.net/download/"},{"type":"WEB","url":"https://www.alexbirnberg.com/roundcube-xss.html"}],"affected":[{"package":{"name":"roundcube","ecosystem":"Bitnami","purl":"pkg:bitnami/roundcube"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.2.13"},{"introduced":"1.3.0"},{"fixed":"1.3.16"},{"introduced":"1.4.0"},{"fixed":"1.4.10"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/roundcube/BIT-roundcube-2020-35730.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}],"schema_version":"1.7.3"}