First published: Tue May 23 2017(Updated: )
Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube Webmail 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter to the default URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Roundcube Webmail | =1.1.1 | |
barnraiser AROUNDMe | =1.1 | |
barnraiser AROUNDMe | =1.1-beta | |
barnraiser AROUNDMe | =1.1-rc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5381 is classified as a medium severity vulnerability due to its potential for exploitation via cross-site scripting.
To fix CVE-2015-5381, upgrade Roundcube Webmail to version 1.1.2 or later.
CVE-2015-5381 affects Roundcube Webmail versions 1.1.1 and earlier.
CVE-2015-5381 is a cross-site scripting (XSS) vulnerability.
CVE-2015-5381 is exploited through the _mbox input parameter in the re-mail.php script.