Bug 1216429 (CVE-2023-46267)

Summary: VUL-0: CVE-2023-46267: roundcube: XSS via a text/html e-mail message containing an SVG image with a USE element
Product: [openSUSE] openSUSE Distribution Reporter: SMASH SMASH <smash_bz>
Component: SecurityAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: abergmann, Andreas.Stieger, lars.vogdt
Version: Leap 15.6   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/382544/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on:    
Bug Blocks: 1225537    

Description SMASH SMASH 2023-10-20 06:44:16 UTC
Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows XSS via a text/html e-mail message containing an SVG image with a USE element. This is related to wash_uri in rcube_washtml.php.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46267
Comment 2 OBSbugzilla Bot 2023-10-26 10:36:07 UTC
This is an autogenerated message for OBS integration:
This bug (1216429) was mentioned in
https://build.opensuse.org/request/show/1120505 Factory / roundcubemail
Comment 3 Marcus Meissner 2023-11-02 17:05:06 UTC
openSUSE-SU-2023:0345-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1216429
CVE References: CVE-2023-5631
JIRA References: 
Sources used:
openSUSE Backports SLE-15-SP5 (src):    roundcubemail-1.6.4-bp155.2.6.1
Comment 4 Andreas Stieger 2024-05-28 21:39:09 UTC
Missing in Leap 15.6. Please process incoming submission or fix in Leap 15.6 in your chosen way. (bug 1225537)
Comment 5 Andreas Stieger 2024-05-29 11:16:02 UTC
As per bug 1225537 now also fixed in Leap 15.6, closing