First published: Fri Apr 08 2011(Updated: )
steps/utils/modcss.inc in Roundcube Webmail before 0.5.1 does not properly verify that a request is an expected request for an external Cascading Style Sheets (CSS) stylesheet, which allows remote authenticated users to trigger arbitrary outbound TCP connections from the server, and possibly obtain sensitive information, via a crafted request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
barnraiser AROUNDMe | =0.1-rc1 | |
barnraiser AROUNDMe | =0.4 | |
barnraiser AROUNDMe | =0.1 | |
barnraiser AROUNDMe | =0.1-beta2 | |
barnraiser AROUNDMe | =0.1-beta | |
barnraiser AROUNDMe | =0.3-rc1 | |
barnraiser AROUNDMe | =0.5-rc | |
barnraiser AROUNDMe | =0.2-alpha | |
barnraiser AROUNDMe | =0.1-rc2 | |
barnraiser AROUNDMe | =0.3-beta | |
barnraiser AROUNDMe | =0.5-beta | |
barnraiser AROUNDMe | =0.4.2 | |
barnraiser AROUNDMe | =0.3 | |
barnraiser AROUNDMe | <=0.5 | |
barnraiser AROUNDMe | =0.1.1 | |
barnraiser AROUNDMe | =0.4-beta | |
barnraiser AROUNDMe | =0.1-alpha | |
barnraiser AROUNDMe | =0.4.1 | |
barnraiser AROUNDMe | =0.2 | |
barnraiser AROUNDMe | =0.2-beta | |
barnraiser AROUNDMe | =0.3.1 | |
barnraiser AROUNDMe | =0.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1492 has been classified as a moderate severity vulnerability.
To fix CVE-2011-1492, you should upgrade Roundcube Webmail to version 0.5.1 or later.
CVE-2011-1492 affects various versions of Roundcube Webmail including versions from 0.1-rc1 to 0.5.
Attackers exploiting CVE-2011-1492 can trigger arbitrary outbound TCP connections and potentially gather sensitive information.
Remote authenticated users of vulnerable versions of Roundcube Webmail are at risk from CVE-2011-1492.