From $URL : A cross-site scripting (XSS) flaws were round in the way Round Cube Webmail, a browser-based multilingual IMAP client, performed sanitization of 'data' and 'vbscript' URLs. A remote attacker could provide a specially-crafted URL that, when opened would lead to arbitrary JavaScript, VisualBasic script or HTML code execution in the context of Round Cube Webmail's user session. Upstream ticket: [1] http://trac.roundcube.net/ticket/1488850 Further details: [2] http://trac.roundcube.net/attachment/ticket/1488850/RoundCube2XSS.pdf Upstream patch: [3] https://github.com/roundcube/roundcubemail/commit/74cd0a9b62f11bc07c5a1d3ba0098b54883eb0ba References: [4] http://sourceforge.net/news/?group_id=139281&id=310213 [5] http://www.openwall.com/lists/oss-security/2013/02/07/11 [6] http://www.openwall.com/lists/oss-security/2013/02/08/1
CVE-2012-6121 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6121): Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 0.8.5 allows remote attackers to inject arbitrary web script or HTML via a (1) data:text or (2) vbscript link.
This was fixed in 0.8.5 which was added to the tree a while before this was opened. Arches, please stabilize: =mail-client/roundcube-0.8.5
arm stable
ppc stable
amd64 stable
x86 stable
Closing noglsa for XSS issue.