Vulnerability Details : CVE-2015-8105
Cross-site scripting (XSS) vulnerability in program/js/app.js in Roundcube webmail before 1.0.7 and 1.1.x before 1.1.3 allows remote authenticated users to inject arbitrary web script or HTML via the file name in a drag-n-drop file upload.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2015-8105
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
- cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*
- cpe:2.3:a:roundcube:webmail:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:roundcube:webmail:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:roundcube:webmail:1.1.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-8105
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 47 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-8105
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
NIST |
CWE ids for CVE-2015-8105
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-8105
-
http://trac.roundcube.net/changeset/dd7db2179/github
404 Not Found
-
http://lists.opensuse.org/opensuse-updates/2015-11/msg00030.html
openSUSE-SU-2015:1904-1: moderate: Security update for roundcubemail
-
https://security.gentoo.org/glsa/201603-03
Roundcube: Multiple Vulnerabilities (GLSA 201603-03) — Gentoo security
-
http://trac.roundcube.net/ticket/1490530
XSS via drag and drop file upload · Issue #4900 · roundcube/roundcubemail · GitHubVendor Advisory
Jump to