Bug 1215609 (CVE-2023-43770) - VUL-0: CVE-2023-43770: roundcubemail: XSS via text/plain e-mail messages with crafted links
Summary: VUL-0: CVE-2023-43770: roundcubemail: XSS via text/plain e-mail messages with...
Status: RESOLVED DUPLICATE of bug 1215433
Alias: CVE-2023-43770
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Lars Vogdt
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/379649/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-09-22 09:17 UTC by Cathy Hu
Modified: 2023-09-22 13:15 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Cathy Hu 2023-09-22 09:17:09 UTC
CVE-2023-43770

Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS
via text/plain e-mail messages with crafted links because of
program/lib/Roundcube/rcube_string_replacer.php behavior.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-43770
https://www.cve.org/CVERecord?id=CVE-2023-43770
https://github.com/roundcube/roundcubemail/commit/e92ec206a886461245e1672d8530cc93c618a49b
https://roundcube.net/news/2023/09/15/security-update-1.6.3-released
Comment 1 Cathy Hu 2023-09-22 09:19:02 UTC
Affected:
- openSUSE:Backports:SLE-15-SP4/roundcubemail  1.5.1

Not affected:
- openSUSE:Factory/roundcubemail               1.6.3
Comment 2 Lars Vogdt 2023-09-22 13:15:31 UTC
Update is already on the way (if not released):

https://build.opensuse.org/package/show/openSUSE:Maintenance:18089/roundcubemail.openSUSE_Backports_SLE-15-SP4_Update

*** This bug has been marked as a duplicate of bug 1215433 ***