{"id":"UBUNTU-CVE-2018-19206","details":"steps/mail/func.inc in Roundcube before 1.3.8 has XSS via crafted use of \u003csvg\u003e\u003cstyle\u003e, as demonstrated by an onload attribute in a BODY element, within an HTML attachment.","modified":"2026-03-31T18:01:19.788971Z","published":"2018-11-12T17:29:00Z","related":["USN-8132-1"],"upstream":["CVE-2018-19206"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-19206"},{"type":"REPORT","url":"https://roundcube.net/news/2018/10/26/update-1.3.8-released"},{"type":"REPORT","url":"https://github.com/roundcube/roundcubemail/issues/6410"},{"type":"REPORT","url":"https://github.com/roundcube/roundcubemail/commit/102fbf1169116fef32a940b9fb1738bc45276059"},{"type":"REPORT","url":"https://github.com/roundcube/roundcubemail/commit/adcac3b9de2728c34c4d2b107e54823b6a7f6a5b"},{"type":"REPORT","url":"https://github.com/roundcube/roundcubemail/releases/tag/1.3.8"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-19206"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8132-1"}],"affected":[{"package":{"name":"roundcube","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/roundcube@1.2~beta+dfsg.1-0ubuntu1+esm7?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2~beta+dfsg.1-0ubuntu1+esm7"}]}],"versions":["1.1.1+dfsg.1-2","1.1.2+dfsg.1-5","1.1.3+dfsg.1-1","1.1.4+dfsg.1-1","1.2~beta+dfsg.1-0ubuntu1","1.2~beta+dfsg.1-0ubuntu1+esm1","1.2~beta+dfsg.1-0ubuntu1+esm2","1.2~beta+dfsg.1-0ubuntu1+esm3","1.2~beta+dfsg.1-0ubuntu1+esm4","1.2~beta+dfsg.1-0ubuntu1+esm5","1.2~beta+dfsg.1-0ubuntu1+esm6"],"ecosystem_specific":{"binaries":[{"binary_version":"1.2~beta+dfsg.1-0ubuntu1+esm7","binary_name":"roundcube"},{"binary_version":"1.2~beta+dfsg.1-0ubuntu1+esm7","binary_name":"roundcube-core"},{"binary_version":"1.2~beta+dfsg.1-0ubuntu1+esm7","binary_name":"roundcube-mysql"},{"binary_version":"1.2~beta+dfsg.1-0ubuntu1+esm7","binary_name":"roundcube-pgsql"},{"binary_version":"1.2~beta+dfsg.1-0ubuntu1+esm7","binary_name":"roundcube-plugins"},{"binary_version":"1.2~beta+dfsg.1-0ubuntu1+esm7","binary_name":"roundcube-sqlite3"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-19206.json"}},{"package":{"name":"roundcube","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/roundcube@1.3.6+dfsg.1-1ubuntu0.1~esm7?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.6+dfsg.1-1ubuntu0.1~esm7"}]}],"versions":["1.3.0+dfsg.1-1","1.3.1+dfsg.1-1","1.3.3+dfsg.1-1","1.3.3+dfsg.1-2","1.3.6+dfsg.1-1","1.3.6+dfsg.1-1ubuntu0.1~esm1","1.3.6+dfsg.1-1ubuntu0.1~esm2","1.3.6+dfsg.1-1ubuntu0.1~esm3","1.3.6+dfsg.1-1ubuntu0.1~esm4","1.3.6+dfsg.1-1ubuntu0.1~esm5","1.3.6+dfsg.1-1ubuntu0.1~esm6"],"ecosystem_specific":{"binaries":[{"binary_version":"1.3.6+dfsg.1-1ubuntu0.1~esm7","binary_name":"roundcube"},{"binary_version":"1.3.6+dfsg.1-1ubuntu0.1~esm7","binary_name":"roundcube-core"},{"binary_version":"1.3.6+dfsg.1-1ubuntu0.1~esm7","binary_name":"roundcube-mysql"},{"binary_version":"1.3.6+dfsg.1-1ubuntu0.1~esm7","binary_name":"roundcube-pgsql"},{"binary_version":"1.3.6+dfsg.1-1ubuntu0.1~esm7","binary_name":"roundcube-plugins"},{"binary_version":"1.3.6+dfsg.1-1ubuntu0.1~esm7","binary_name":"roundcube-sqlite3"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-19206.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}