Summary: | <mail-client/roundcube-1.2.4: XSS issue in handling of a style tag inside of an svg element (CVE-2017-6820) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Thomas Deutschmann (RETIRED) <whissi> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | titanofold, web-apps |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://seclists.org/oss-sec/2017/q1/583 | ||
Whiteboard: | B4 [noglsa cve] | ||
Package list: |
=mail-client/roundcube-1.2.4
|
Runtime testing required: | --- |
Bug Depends on: | 612662 | ||
Bug Blocks: |
Description
Thomas Deutschmann (RETIRED)
![]() @ Arches, please test and mark stable: =mail-client/roundcube-1.2.4 CVE-2017-6820 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6820): rcube_utils.php in Roundcube before 1.1.8 and 1.2.x before 1.2.4 is susceptible to a cross-site scripting vulnerability via a crafted Cascading Style Sheets (CSS) token sequence within an SVG element. amd64 stable arm stable. x86 stable. Maintainer(s), please cleanup. Security, please vote. GLSA Vote: Yes New GLSA request filed. (In reply to Thomas Deutschmann from comment #6) > GLSA Vote: Yes > > New GLSA request filed. There are no GLSA's for Cross Site Scripting Maintainer(s), please drop the vulnerable version(s). (In reply to Yury German from comment #7) > (In reply to Thomas Deutschmann from comment #6) > > GLSA Vote: Yes > > > > New GLSA request filed. > > There are no GLSA's for Cross Site Scripting > Maintainer(s), please drop the vulnerable version(s). Dropped. Arches and Maintainer(s), Thank you for your work. |