NethServer / dev

NethServer issue tracker
https://github.com/NethServer/dev/issues
63 stars 20 forks source link

roundcubemail: upgrade to 1.6.8 #6999

Closed stephdl closed 2 weeks ago

stephdl commented 3 weeks ago

A Cross-Site Scripting vulnerability in rcmail_action_mail_get->run() in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a malicious e-mail attachment served with a dangerous Content-Type header.

Proposed solution

To address this vulnerability, it is essential to upgrade to Roundcube version 1.6.8, where the issue has been resolved.

Alternative solutions

no much ways, we cannot fix this CVE without upgrading

Additional context

we use actually roundcubemail:1.6.6-apache, we have subtasks

See also

https://mattermost.nethesis.it/nethesis/pl/ro981m1d43guje3rcpu4d7ay8e

https://www.cve.org/CVERecord?id=CVE-2024-42008


thank nick

stephdl commented 3 weeks ago

QA

we expect to upgrade to roundcubemail to 1.6.8 for both NS7 and NS8

lucagasparini commented 3 weeks ago

Test 1 on NS8 (upgrade)> OK Test 2 on NS8 (install)> OK Test 3 on NS7 (upgrade)> OK Test 4 on NS7 (install)> OK

stephdl commented 2 weeks ago

released as ghcr.io/nethserver/roundcubemail:2.0.3 released as nethserver-roundcubemail-next-1.5.8-1.ns7.noarch.rpm

set closed