Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 456664 (CVE-2012-6121) - <mail-client/roundcube-0.8.5: Cross-site scripting (XSS) in vbscript: and data:text URL handling (CVE-2012-6121)
Summary: <mail-client/roundcube-0.8.5: Cross-site scripting (XSS) in vbscript: and dat...
Status: RESOLVED FIXED
Alias: CVE-2012-6121
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-02-10 15:12 UTC by Agostino Sarubbo
Modified: 2013-03-22 14:45 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-02-10 15:12:46 UTC
From $URL :

A cross-site scripting (XSS) flaws were round in the way Round Cube Webmail, a browser-based multilingual IMAP client, performed sanitization of 'data' and 'vbscript' URLs. 
A remote attacker could provide a specially-crafted URL that, when opened would lead to arbitrary JavaScript, VisualBasic script or HTML code execution in the context of 
Round Cube Webmail's user session.

Upstream ticket:
[1] http://trac.roundcube.net/ticket/1488850

Further details:
[2] http://trac.roundcube.net/attachment/ticket/1488850/RoundCube2XSS.pdf

Upstream patch:
[3] https://github.com/roundcube/roundcubemail/commit/74cd0a9b62f11bc07c5a1d3ba0098b54883eb0ba

References:
[4] http://sourceforge.net/news/?group_id=139281&id=310213
[5] http://www.openwall.com/lists/oss-security/2013/02/07/11
[6] http://www.openwall.com/lists/oss-security/2013/02/08/1
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2013-03-04 23:07:03 UTC
CVE-2012-6121 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6121):
  Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 0.8.5
  allows remote attackers to inject arbitrary web script or HTML via a (1)
  data:text or (2) vbscript link.
Comment 2 Tim Harder gentoo-dev 2013-03-07 20:11:02 UTC
This was fixed in 0.8.5 which was added to the tree a while before this was opened.

Arches, please stabilize:
=mail-client/roundcube-0.8.5
Comment 3 Agostino Sarubbo gentoo-dev 2013-03-08 17:46:55 UTC
arm stable
Comment 4 Agostino Sarubbo gentoo-dev 2013-03-09 11:29:30 UTC
ppc stable
Comment 5 Agostino Sarubbo gentoo-dev 2013-03-17 14:45:35 UTC
amd64 stable
Comment 6 Agostino Sarubbo gentoo-dev 2013-03-17 14:45:48 UTC
x86 stable
Comment 7 Sean Amoss (RETIRED) gentoo-dev Security 2013-03-22 14:45:45 UTC
Closing noglsa for XSS issue.