{"id":"UBUNTU-CVE-2015-1433","details":"program/lib/Roundcube/rcube_washtml.php in Roundcube before 1.0.5 does not properly quote strings, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the style attribute in an email.","modified":"2025-07-16T07:32:40.179236Z","published":"2015-02-03T16:59:00Z","withdrawn":"2025-07-18T16:43:10Z","upstream":["CVE-2015-1433"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-1433"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2015/01/31/6"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2015/01/31/3"},{"type":"REPORT","url":"http://trac.roundcube.net/ticket/1490227"},{"type":"REPORT","url":"http://trac.roundcube.net/changeset/786aa0725/github"},{"type":"REPORT","url":"http://roundcube.net/news/2015/01/24/security-update-1.0.5/"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2015-1433"}],"affected":[{"package":{"name":"roundcube","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/roundcube@1.3.6+dfsg.1-1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.6+dfsg.1-1"}]}],"versions":["1.3.0+dfsg.1-1","1.3.1+dfsg.1-1","1.3.3+dfsg.1-1","1.3.3+dfsg.1-2"],"ecosystem_specific":{"binaries":[{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-core"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-mysql"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-pgsql"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-plugins"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-sqlite3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-1433.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}