First published: Mon Aug 05 2024(Updated: )
A Cross-Site Scripting vulnerability in rcmail_action_mail_get->run() in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a malicious e-mail attachment served with a dangerous Content-Type header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Roundcube Webmail | <1.5.8 | |
Roundcube Webmail | >=1.6.0<1.6.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42008 is classified as a critical severity Cross-Site Scripting vulnerability.
To fix CVE-2024-42008, upgrade Roundcube to version 1.5.8 or 1.6.8 and above.
Versions of Roundcube from 1.5.7 and 1.6.0 to 1.6.7 are affected by CVE-2024-42008.
CVE-2024-42008 is associated with a Cross-Site Scripting attack that can allow attackers to steal emails.
Yes, CVE-2024-42008 can lead to unauthorized access and theft of emails due to its exploitation capabilities.