Bug ID | 1173792 |
---|---|
Summary | VUL-0: CVE-2020-15562: XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.1 |
Hardware | Other |
URL | https://smash.suse.de/issue/262896/ |
OS | Other |
Status | NEW |
Severity | Minor |
Priority | P5 - None |
Component | Security |
Assignee | aj@ajaissle.de |
Reporter | atoptsoglou@suse.com |
QA Contact | security-team@suse.de |
Found By | Security Response Team |
Blocker | --- |
CVE-2020-15562 An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15562 https://github.com/roundcube/roundcubemail/releases/tag/1.4.7 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15562 https://github.com/roundcube/roundcubemail/commit/3e8832d029b035e3fcfb4c75839567a9580b4f82 https://github.com/roundcube/roundcubemail/releases/tag/1.2.11 https://github.com/roundcube/roundcubemail/releases/tag/1.3.14