First published: Sun Apr 07 2019(Updated: )
In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Roundcube Webmail | <1.3.10 | |
Fedoraproject Fedora | =29 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Backports SLE | =15.0-sp2 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10740 is a vulnerability in Roundcube Webmail before version 1.3.10 that allows an attacker to wrap S/MIME or PGP encrypted emails within a crafted multipart email.
An attacker can exploit CVE-2019-10740 by creating a modified multipart email that contains hidden, encrypted sub-parts using HTML/CSS or ASCII newline characters.
The severity of CVE-2019-10740 is medium with a severity value of 4.3.
Roundcube Webmail versions before 1.3.10, Fedora version 29, openSUSE Backports SLE versions 15.0-sp1 and 15.0-sp2, openSUSE Leap versions 15.1 and 15.2 are affected by CVE-2019-10740.
To fix CVE-2019-10740, update Roundcube Webmail to version 1.3.10 or later.