4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.9 Medium
AI Score
Confidence
High
0.056 Low
EPSS
Percentile
93.3%
Debian Security Advisory DSA-4700-1 [email protected]
https://www.debian.org/security/ Sebastien Delafond
June 11, 2020 https://www.debian.org/security/faq
Package : roundcube
CVE ID : CVE-2020-13964 CVE-2020-13965
Debian Bug : 962123 962124
Matei Badanoiu and LoRexxar@knownsec discovered that roundcube, a
skinnable AJAX based webmail solution for IMAP servers, did not
correctly process and sanitize requests. This would allow a remote
attacker to perform a Cross-Side Scripting (XSS) attack leading to the
execution of arbitrary code.
For the oldstable distribution (stretch), these problems have been fixed
in version 1.2.3+dfsg.1-4+deb9u5.
For the stable distribution (buster), these problems have been fixed in
version 1.3.13+dfsg.1-1~deb10u1.
We recommend that you upgrade your roundcube packages.
For the detailed security status of roundcube please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/roundcube
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | all | roundcube-sqlite3 | < 1.2.3+dfsg.1-4+deb9u5 | roundcube-sqlite3_1.2.3+dfsg.1-4+deb9u5_all.deb |
Debian | 9 | all | roundcube-pgsql | < 1.2.3+dfsg.1-4+deb9u5 | roundcube-pgsql_1.2.3+dfsg.1-4+deb9u5_all.deb |
Debian | 10 | all | roundcube-sqlite3 | < 1.3.13+dfsg.1-1~deb10u1 | roundcube-sqlite3_1.3.13+dfsg.1-1~deb10u1_all.deb |
Debian | 9 | all | roundcube-mysql | < 1.2.3+dfsg.1-4+deb9u5 | roundcube-mysql_1.2.3+dfsg.1-4+deb9u5_all.deb |
Debian | 10 | all | roundcube-core | < 1.3.13+dfsg.1-1~deb10u1 | roundcube-core_1.3.13+dfsg.1-1~deb10u1_all.deb |
Debian | 10 | all | roundcube-plugins | < 1.3.13+dfsg.1-1~deb10u1 | roundcube-plugins_1.3.13+dfsg.1-1~deb10u1_all.deb |
Debian | 10 | all | roundcube | < 1.3.13+dfsg.1-1~deb10u1 | roundcube_1.3.13+dfsg.1-1~deb10u1_all.deb |
Debian | 9 | all | roundcube-core | < 1.2.3+dfsg.1-4+deb9u5 | roundcube-core_1.2.3+dfsg.1-4+deb9u5_all.deb |
Debian | 9 | all | roundcube-plugins | < 1.2.3+dfsg.1-4+deb9u5 | roundcube-plugins_1.2.3+dfsg.1-4+deb9u5_all.deb |
Debian | 9 | all | roundcube | < 1.2.3+dfsg.1-4+deb9u5 | roundcube_1.2.3+dfsg.1-4+deb9u5_all.deb |
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.9 Medium
AI Score
Confidence
High
0.056 Low
EPSS
Percentile
93.3%