| Vulnerability Name: | CVE-2007-6321 (CCN-38981) | ||||||||
| Assigned: | 2007-12-09 | ||||||||
| Published: | 2007-12-09 | ||||||||
| Updated: | 2018-10-15 | ||||||||
| Summary: | Cross-site scripting (XSS) vulnerability in RoundCube webmail 0.1rc2, 2007-12-09, and earlier versions, when using Internet Explorer, allows remote attackers to inject arbitrary web script or HTML via style sheets containing expression commands. | ||||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
| CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-79 | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: CCN Type: BugTraq Mailing List, Sun Dec 09 2007 - 07:39:34 CST Unsanitized scripting in RoundCube webmail Source: MITRE Type: CNA CVE-2007-6321 Source: MISC Type: Exploit http://openmya.hacker.jp/hasegawa/security/expression.txt Source: CCN Type: SA30734 RoundCube Webmail Script Insertion Vulnerability Source: SECUNIA Type: UNKNOWN 30734 Source: SREASON Type: Exploit 3435 Source: CONFIRM Type: Exploit http://trac.roundcube.net/ticket/1484701 Source: CCN Type: OSVDB ID: 44117 RoundCube Webmail Style Sheet Expression Commands XSS Source: CCN Type: The RoundCube Webmail Project Web page RoundCube Webmail Source: BUGTRAQ Type: UNKNOWN 20071209 Unsanitized scripting in RoundCube webmail Source: BID Type: Exploit 26800 Source: CCN Type: BID-26800 Roundcube Webmail CSS Expression Input Validation Vulnerability Source: XF Type: UNKNOWN roundcube-email-messages-xss(38981) Source: XF Type: UNKNOWN roundcube-email-messages-xss(38981) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||