Cross-site scripting (XSS) vulnerability in program/js/app.js in Roundcube webmail before 1.0.7 and 1.1.x before 1.1.3 allows remote authenticated users to inject arbitrary web script or HTML via the file name in a drag-n-drop file upload.
{
"binaries": [
{
"binary_name": "roundcube",
"binary_version": "1.1.3+dfsg.1-1"
},
{
"binary_name": "roundcube-core",
"binary_version": "1.1.3+dfsg.1-1"
},
{
"binary_name": "roundcube-mysql",
"binary_version": "1.1.3+dfsg.1-1"
},
{
"binary_name": "roundcube-pgsql",
"binary_version": "1.1.3+dfsg.1-1"
},
{
"binary_name": "roundcube-plugins",
"binary_version": "1.1.3+dfsg.1-1"
},
{
"binary_name": "roundcube-sqlite3",
"binary_version": "1.1.3+dfsg.1-1"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "roundcube",
"binary_version": "1.3.6+dfsg.1-1"
},
{
"binary_name": "roundcube-core",
"binary_version": "1.3.6+dfsg.1-1"
},
{
"binary_name": "roundcube-mysql",
"binary_version": "1.3.6+dfsg.1-1"
},
{
"binary_name": "roundcube-pgsql",
"binary_version": "1.3.6+dfsg.1-1"
},
{
"binary_name": "roundcube-plugins",
"binary_version": "1.3.6+dfsg.1-1"
},
{
"binary_name": "roundcube-sqlite3",
"binary_version": "1.3.6+dfsg.1-1"
}
],
"availability": "No subscription required"
}