First published: Mon Feb 26 2024(Updated: )
It was discovered that Roundcube Webmail incorrectly sanitized characters in the linkrefs text messages. An attacker could possibly use this issue to execute a cross-site scripting (XSS) attack. (CVE-2023-43770)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/roundcube | <1.6.2+dfsg-1ubuntu0.1 | 1.6.2+dfsg-1ubuntu0.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/roundcube-core | <1.6.2+dfsg-1ubuntu0.1 | 1.6.2+dfsg-1ubuntu0.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/roundcube | <1.5.0+dfsg.1-2ubuntu0.1~esm2 | 1.5.0+dfsg.1-2ubuntu0.1~esm2 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/roundcube-core | <1.5.0+dfsg.1-2ubuntu0.1~esm2 | 1.5.0+dfsg.1-2ubuntu0.1~esm2 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/roundcube | <1.4.3+dfsg.1-1ubuntu0.1~esm3 | 1.4.3+dfsg.1-1ubuntu0.1~esm3 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/roundcube-core | <1.4.3+dfsg.1-1ubuntu0.1~esm3 | 1.4.3+dfsg.1-1ubuntu0.1~esm3 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/roundcube | <1.3.6+dfsg.1-1ubuntu0.1~esm3 | 1.3.6+dfsg.1-1ubuntu0.1~esm3 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/roundcube-core | <1.3.6+dfsg.1-1ubuntu0.1~esm3 | 1.3.6+dfsg.1-1ubuntu0.1~esm3 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/roundcube | <1.2~beta+dfsg.1-0ubuntu1+esm3 | 1.2~beta+dfsg.1-0ubuntu1+esm3 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/roundcube-core | <1.2~beta+dfsg.1-0ubuntu1+esm3 | 1.2~beta+dfsg.1-0ubuntu1+esm3 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability USN-6654-1 is classified as a potential cross-site scripting (XSS) issue which can lead to severe security risks.
To fix USN-6654-1, upgrade Roundcube to the patched version specified in the advisory, such as 1.6.2+dfsg-1ubuntu0.1 or later.
If exploited, USN-6654-1 could allow attackers to execute arbitrary scripts in the context of a user session, compromising user data.
Versions of Roundcube prior to 1.6.2+dfsg-1ubuntu0.1 are affected by vulnerability USN-6654-1.
There are no official workarounds for USN-6654-1; it is recommended to apply the available security update as soon as possible.