Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube Webmail 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter to the default URI.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 02:32
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://trac.roundcube.net/ticket/1490417 - Issue Tracking, Patch, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2015/07/07/2 - Mailing List, Patch, Third Party Advisory | |
| References | () https://github.com/roundcube/roundcubemail/commit/b782815dacda55eee6793249b5da1789256206fc - Issue Tracking, Patch, Third Party Advisory | |
| References | () https://github.com/roundcube/roundcubemail/issues/4837 - Issue Tracking, Patch, Third Party Advisory | |
| References | () https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released - Patch, Vendor Advisory | 
Information
                Published : 2017-05-23 04:29
Updated : 2025-04-20 01:37
NVD link : CVE-2015-5381
Mitre link : CVE-2015-5381
CVE.ORG link : CVE-2015-5381
JSON object : View
Products Affected
                roundcube
- webmail
- roundcube_webmail
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
