Bug 1216429 (CVE-2023-46267) - VUL-0: CVE-2023-46267: roundcube: XSS via a text/html e-mail message containing an SVG image with a USE element
Summary: VUL-0: CVE-2023-46267: roundcube: XSS via a text/html e-mail message containi...
Status: RESOLVED FIXED
Alias: CVE-2023-46267
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 15.6
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/382544/
Whiteboard:
Keywords:
Depends on:
Blocks: 1225537
  Show dependency treegraph
 
Reported: 2023-10-20 06:44 UTC by SMASH SMASH
Modified: 2024-05-29 11:16 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-10-20 06:44:16 UTC
Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows XSS via a text/html e-mail message containing an SVG image with a USE element. This is related to wash_uri in rcube_washtml.php.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46267
Comment 2 OBSbugzilla Bot 2023-10-26 10:36:07 UTC
This is an autogenerated message for OBS integration:
This bug (1216429) was mentioned in
https://build.opensuse.org/request/show/1120505 Factory / roundcubemail
Comment 3 Marcus Meissner 2023-11-02 17:05:06 UTC
openSUSE-SU-2023:0345-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1216429
CVE References: CVE-2023-5631
JIRA References: 
Sources used:
openSUSE Backports SLE-15-SP5 (src):    roundcubemail-1.6.4-bp155.2.6.1
Comment 4 Andreas Stieger 2024-05-28 21:39:09 UTC
Missing in Leap 15.6. Please process incoming submission or fix in Leap 15.6 in your chosen way. (bug 1225537)
Comment 5 Andreas Stieger 2024-05-29 11:16:02 UTC
As per bug 1225537 now also fixed in Leap 15.6, closing