Bugtraq mailing list archives
Unsanitized scripting in RoundCube webmail
From: Tomas Kuliavas <tokul () users sourceforge net>
Date: Sun, 09 Dec 2007 15:39:34 +0200
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Site address: http://roundcube.net/ Roundcube webmail does not sanitize Microsoft Internet Explorer scripting issues reported by Yosuke Hasegawa. Author was contacted on 2007-05-11. I haven't received any response and current (2007-12-09) code is still vulnerable. Report about IE issues: http://openmya.hacker.jp/hasegawa/security/expression.txt Affected versions: checked 0.1rc2 and 2007-12-09 svn trunk. POC exploit: http://www.topolis.lt/bugtraq/expression.eml.gz - -- Tomas Kuliavas -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHW/AWaYoxl8XwnvYRAgPgAJ9s46H0c09tUY+w5W6hnCUqf2mlxQCZAYER B5ySOVLoJ03jtaxu6K1JNl8= =YsAe -----END PGP SIGNATURE-----
Current thread:
- Unsanitized scripting in RoundCube webmail Tomas Kuliavas (Dec 10)