lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <475BF016.6000005@users.sourceforge.net> Date: Sun, 09 Dec 2007 15:39:34 +0200 From: Tomas Kuliavas <tokul@...rs.sourceforge.net> To: bugtraq@...urityfocus.com Subject: Unsanitized scripting in RoundCube webmail -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Site address: http://roundcube.net/ Roundcube webmail does not sanitize Microsoft Internet Explorer scripting issues reported by Yosuke Hasegawa. Author was contacted on 2007-05-11. I haven't received any response and current (2007-12-09) code is still vulnerable. Report about IE issues: http://openmya.hacker.jp/hasegawa/security/expression.txt Affected versions: checked 0.1rc2 and 2007-12-09 svn trunk. POC exploit: http://www.topolis.lt/bugtraq/expression.eml.gz - -- Tomas Kuliavas -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHW/AWaYoxl8XwnvYRAgPgAJ9s46H0c09tUY+w5W6hnCUqf2mlxQCZAYER B5ySOVLoJ03jtaxu6K1JNl8= =YsAe -----END PGP SIGNATURE-----