[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2012:072 -- Mandriva roundcubemail

ID: oval:org.secpod.oval:def:1300054Date: (C)2013-04-08   (M)2022-10-10
Class: PATCHFamily: unix




Multiple vulnerabilities has been found and corrected in roundcubemail: The login form in Roundcube Webmail before 0.5.1 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to login to the attacker's account and then compose an e-mail message, related to a login CSRF issue . steps/utils/modcss.inc in Roundcube Webmail before 0.5.1 does not properly verify that a request is an expected request for an external Cascading Style Sheets stylesheet, which allows remote authenticated users to trigger arbitrary outbound TCP connections from the server, and possibly obtain sensitive information, via a crafted request . Cross-site scripting vulnerability in the UI messages functionality in Roundcube Webmail before 0.5.4 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter to the default URI . include/iniset.php in Roundcube Webmail 0.5.4 and earlier, when PHP 5.3.7 or 5.3.8 is used, allows remote attackers to trigger a GET request for an arbitrary URL, and cause a denial of service , via a Subject header containing only a URL, a related issue to CVE-2011-3379 . The updated packages have been upgraded to the 0.7.2 version which is not affected by these issues.

Platform:
Mandriva Enterprise Server 5.2
Product:
roundcubemail
Reference:
MDVSA-2012:072
CVE-2011-4078
CVE-2011-2937
CVE-2011-1492
CVE-2011-1491
CVE    4
CVE-2011-1491
CVE-2011-1492
CVE-2011-4078
CVE-2011-2937
...
CPE    1
cpe:/o:mandriva:enterprise_server:5.2

© SecPod Technologies