[3.9] roundcubemail: Cross-site Scripting issue in email attachments (CVE-2018-19206)
steps/mail/func.inc in Roundcube before 1.3.8 has XSS via crafted use of
, as demonstrated by an onload attribute in a BODY element, within an HTML attachment. ### References: https://github.com/roundcube/roundcubemail/issues/6410 https://nvd.nist.gov/vuln/detail/CVE-2018-19206 ### Patch: https://github.com/roundcube/roundcubemail/commit/102fbf1169116fef32a940b9fb1738bc45276059 *(from redmine: issue id 9696, created on 2018-11-26, closed on 2018-12-04)* * Relations: * parent #9695 (closed) * Changesets: * Revision 1d5dbd01 by Natanael Copa on 2018-11-29T14:42:08Z: ``` community/roundcubemail: security upgrade to 1.3.8 (CVE-2018-19206) fixes #9696 (closed) ```