Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <201308281659.r7SGxhHq028090@linus.mitre.org>
Date: Wed, 28 Aug 2013 12:59:43 -0400 (EDT)
From: cve-assign@...re.org
To: vdanen@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: roundcube 0.9.3 fixes two XSS flaws

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>[2] http://trac.roundcube.net/ticket/1489251

The first CVE assignment for this is CVE-2013-5645. The scope of this
CVE includes:

  http://trac.roundcube.net/changeset/93b0a30c1c8aa29d862b587b31e52bcc344b8d16/github

  Fix XSS vulnerability when editing a message "as new" or draft

  "rcmail_wash_html($body, array('safe' => 1), $cid_map);"
  added in compose.inc

The scope of this CVE also includes:

  http://trac.roundcube.net/changeset/ce5a6496fd6039962ba7424d153278e41ae8761b/github

  Fix XSS vulnerability when saving HTML signatures

  "rcmail_wash_html($save_data['signature']);"
  added in save_identity.inc

to the extent that this can cross privilege boundaries within the
Roundcube webmail product.

All aspects of CVE-2013-5645 were discovered by und3r. These are all
CVE-2013-5645 references:

  http://trac.roundcube.net/wiki/Changelog#RELEASE0.9.3
  http://trac.roundcube.net/ticket/1489251
  http://trac.roundcube.net/changeset/ce5a6496fd6039962ba7424d153278e41ae8761b/github
  http://trac.roundcube.net/changeset/93b0a30c1c8aa29d862b587b31e52bcc344b8d16/github


The scope of CVE-2013-5645 does not include any additional
exploitation approaches (if any) in Roundcube webmail, or other
products, that are related to:

  'This kind of problem is present in all parts where there is
  the "MCE" editor (or, more specifically, where there is a
  <textarea> with the CSS class "mce_editor").'

That may possibly have other CVE assignments if someone investigates
it at a later time.


Finally, there is a separate CVE assignment of CVE-2013-5646 for this
other issue with different affected versions:

  As far as we can tell from the
  http://trac.roundcube.net/ticket/1489251 history, the
  addressbook group vulnerability was discovered by dennis1993
  and affects only version 1.0-git (not version 0.9.2). There is
  no direct statement that the addressbook group vulnerability
  was fixed. It seems likely that the addressbook group
  vulnerability could cross privilege boundaries if the "click on
  this group after creation" action were performed by an
  administrator who was visiting the addressbook of an
  unprivileged user.

http://trac.roundcube.net/ticket/1489251 is the only CVE-2013-5646
reference that we know of at the moment.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJSHif2AAoJEGvefgSNfHMdcrEH/3cAf2Qn9FvArkhmvwGWhPmI
ddWBmTh0aoPNzuOYsNXT6ZMsBEFzRAFpcbCx4Mf32UvKO3tK/BJeQLC+eEk1XuzQ
0+59K2KKM5y/l13qwYP3I02RyvbQEDGzKsh1EsHlKwY2vcoPoHoETYutHPtQ6HEP
v2JgqyCMwaF+NGtqx2hK/eeiR0xBVf339ODHnii296d1KqCpcIAAPyoVGX75YZ3O
djG9lND36wHZ9S+Huy1APi1rx/SZnPxHjaBdtVU2GGAiGpu26zZpstN3HmVbMI+v
8jyYNpJstorjmgZqO/GwFoJ+M47YIwnISiMvCeItAClC2EwKKVRd1RLOZmGkeUM=
=vhpO
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.