First published: Fri Jan 29 2016(Updated: )
Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube before 1.0.6 and 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter in a mail task to the default URL, a different vulnerability than CVE-2011-2937.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
barnraiser AROUNDMe | <=1.0.5 | |
barnraiser AROUNDMe | =1.1.0 | |
barnraiser AROUNDMe | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8793 is classified as a moderate severity cross-site scripting (XSS) vulnerability.
To fix CVE-2015-8793, you should update Roundcube to version 1.0.6 or 1.1.2 or later.
CVE-2015-8793 affects Roundcube versions before 1.0.6 and 1.1.x before 1.1.2.
Yes, CVE-2015-8793 can allow attackers to inject malicious scripts, potentially leading to data breaches.
No, user input is not safe and can be exploited in the affected versions of Roundcube due to the vulnerability.