{"id":"USN-5182-1","summary":"roundcube vulnerabilities","details":"It was discovered that Roundcube Webmail allowed JavaScript code to be present\nin the CDATA of an HTML message. A remote attacker could possibly use this\nissue to execute a cross-site scripting (XSS) attack. This issue only affected\nUbuntu 16.04 ESM, Ubuntu 18.04 ESM and Ubuntu 20.04 ESM. (CVE-2020-12625)\n\nIt was discovered that Roundcube Webmail incorrectly processed login and\nlogout POST requests. An attacker could possibly use this issue to launch a\ncross-site request forgery (CSRF) attack and force an authenticated user to be\nlogged out. This issue only affected Ubuntu 16.04 ESM, Ubuntu 18.04 ESM and\nUbuntu 20.04 ESM. (CVE-2020-12626)\n\nIt was discovered that Roundcube Webmail incorrectly processed new plugin names\nin rcube_plugin_api.php. An attacker could possibly use this issue to obtain\nsensitive information from local files or to execute arbitrary code.\nThis issue only affected Ubuntu 16.04 ESM, Ubuntu 18.04 ESM and\nUbuntu 20.04 ESM. (CVE-2020-12640)\n\nIt was discovered that Roundcube Webmail did not sanitize shell metacharacters\nrecovered from variables in its configuration settings. An attacker could\npossibly use this issue to execute arbitrary code in the server. This issue\nonly affected Ubuntu 16.04 ESM, Ubuntu 18.04 ESM and Ubuntu 20.04 ESM.\n(CVE-2020-12641)\n\nIt was discovered that Roundcube Webmail incorrectly sanitized characters in\nthe username template object. An attacker could possibly use this issue to\nexecute a cross-site scripting (XSS) attack. This issue only affected\nUbuntu 16.04 ESM, Ubuntu 18.04 ESM and Ubuntu 20.04 ESM. (CVE-2020-13964)\n\nIt was discovered that Roundcube Webmail allowed preview of text/html content.\nA remote attacker could possibly use this issue to send a malicious XML\nattachment via an email message and execute a cross-site scripting (XSS)\nattack. This issue only affected Ubuntu 16.04 ESM, Ubuntu 18.04 ESM\nand Ubuntu 20.04 ESM. (CVE-2020-13965)\n\nAndrea Cardaci discovered that Roundcube Webmail did not properly sanitize\nHTML special characters when dealing with HTML messages that contained an SVG\nelement in the XML namespace. A remote attacker could possibly use this issue\nto execute a cross-site scripting (XSS) attack. This issue only affected\nUbuntu 18.04 ESM and Ubuntu 20.04 ESM. (CVE-2020-15562)\n\nLukasz Pilorz discovered that Roundcube Webmail did not properly sanitize HTML\nspecial characters when dealing with HTML messages that contained SVG\ndocuments. A remote attacker could possibly use this issue to execute a\ncross-site scripting (XSS) attack. This issue only affected Ubuntu 18.04 ESM\nand Ubuntu 20.04 ESM. (CVE-2020-16145)\n\nAlex Birnberg discovered that Roundcube Webmail incorrectly sanitized\ncharacters in plain text e-mail messages that included link reference\nelements. A remote attacker could possibly use this issue to execute a\ncross-site scripting (XSS) attack. This issue only affected Ubuntu 16.04 ESM,\nUbuntu 18.04 ESM and Ubuntu 20.04 ESM. (CVE-2020-35730)\n\nIt was discovered that Roundcube Webmail did not properly sanitize HTML\nspecial characters in warning messages that contained an attachment's filename\nextension. A remote attacker could possibly use this issue to execute a\ncross-site scripting (XSS) attack. This issue only affected Ubuntu 16.04 ESM,\nUbuntu 18.04 ESM and Ubuntu 20.04 ESM. (CVE-2021-44025)\n\nIt was discovered that Roundcube Webmail incorrectly managed session variables\nrelated to search functionalities. A remote attacker could possibly use this\nissue to execute a SQL injection attack. This issue only affected\nUbuntu 16.04 ESM, Ubuntu 18.04 ESM and Ubuntu 20.04 ESM. (CVE-2021-44026)\n\nIt was discovered that Roundcube Webmail did not properly sanitize HTML\nspecial characters when dealing with HTML messages that contained CSS content.\nA remote attacker could possibly use this issue to execute a cross-site\nscripting (XSS) attack. This issue only affected Ubuntu 18.04 ESM,\nUbuntu 20.04 ESM and Ubuntu 22.04 ESM. (CVE-2021-46144)\n","modified":"2026-02-10T04:42:24Z","published":"2022-08-08T06:30:29Z","related":["UBUNTU-CVE-2020-12625","UBUNTU-CVE-2020-12626","UBUNTU-CVE-2020-12640","UBUNTU-CVE-2020-12641","UBUNTU-CVE-2020-13964","UBUNTU-CVE-2020-13965","UBUNTU-CVE-2020-15562","UBUNTU-CVE-2020-16145","UBUNTU-CVE-2020-35730","UBUNTU-CVE-2021-44025","UBUNTU-CVE-2021-44026","UBUNTU-CVE-2021-46144"],"upstream":["CVE-2020-12625","CVE-2020-12626","CVE-2020-12640","CVE-2020-12641","CVE-2020-13964","CVE-2020-13965","CVE-2020-15562","CVE-2020-16145","CVE-2020-35730","CVE-2021-44025","CVE-2021-44026","CVE-2021-46144","UBUNTU-CVE-2020-12625","UBUNTU-CVE-2020-12626","UBUNTU-CVE-2020-12640","UBUNTU-CVE-2020-12641","UBUNTU-CVE-2020-13964","UBUNTU-CVE-2020-13965","UBUNTU-CVE-2020-15562","UBUNTU-CVE-2020-16145","UBUNTU-CVE-2020-35730","UBUNTU-CVE-2021-44025","UBUNTU-CVE-2021-44026","UBUNTU-CVE-2021-46144"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5182-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-12625"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-12626"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-12640"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-12641"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-13964"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-13965"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-15562"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-16145"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-35730"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-44025"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-44026"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-46144"}],"affected":[{"package":{"name":"roundcube","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/roundcube@1.2~beta+dfsg.1-0ubuntu1+esm2?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2~beta+dfsg.1-0ubuntu1+esm2"}]}],"versions":["1.1.1+dfsg.1-2","1.1.2+dfsg.1-5","1.1.3+dfsg.1-1","1.1.4+dfsg.1-1","1.2~beta+dfsg.1-0ubuntu1","1.2~beta+dfsg.1-0ubuntu1+esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"roundcube","binary_version":"1.2~beta+dfsg.1-0ubuntu1+esm2"},{"binary_name":"roundcube-core","binary_version":"1.2~beta+dfsg.1-0ubuntu1+esm2"},{"binary_name":"roundcube-mysql","binary_version":"1.2~beta+dfsg.1-0ubuntu1+esm2"},{"binary_name":"roundcube-pgsql","binary_version":"1.2~beta+dfsg.1-0ubuntu1+esm2"},{"binary_name":"roundcube-plugins","binary_version":"1.2~beta+dfsg.1-0ubuntu1+esm2"},{"binary_name":"roundcube-sqlite3","binary_version":"1.2~beta+dfsg.1-0ubuntu1+esm2"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5182-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"id":"CVE-2020-12625","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-12626","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-12640","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-12641","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2020-13964","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-13965","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2020-35730","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2021-44025","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-44026","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}]}}},{"package":{"name":"roundcube","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/roundcube@1.3.6+dfsg.1-1ubuntu0.1~esm2?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.6+dfsg.1-1ubuntu0.1~esm2"}]}],"versions":["1.3.0+dfsg.1-1","1.3.1+dfsg.1-1","1.3.3+dfsg.1-1","1.3.3+dfsg.1-2","1.3.6+dfsg.1-1","1.3.6+dfsg.1-1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"roundcube","binary_version":"1.3.6+dfsg.1-1ubuntu0.1~esm2"},{"binary_name":"roundcube-core","binary_version":"1.3.6+dfsg.1-1ubuntu0.1~esm2"},{"binary_name":"roundcube-mysql","binary_version":"1.3.6+dfsg.1-1ubuntu0.1~esm2"},{"binary_name":"roundcube-pgsql","binary_version":"1.3.6+dfsg.1-1ubuntu0.1~esm2"},{"binary_name":"roundcube-plugins","binary_version":"1.3.6+dfsg.1-1ubuntu0.1~esm2"},{"binary_name":"roundcube-sqlite3","binary_version":"1.3.6+dfsg.1-1ubuntu0.1~esm2"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5182-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"id":"CVE-2020-12625","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-12626","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-12640","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-12641","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2020-13964","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-13965","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2020-15562","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-16145","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-35730","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2021-44025","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-44026","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2021-46144","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}},{"package":{"name":"roundcube","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/roundcube@1.4.3+dfsg.1-1ubuntu0.1~esm2?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.3+dfsg.1-1ubuntu0.1~esm2"}]}],"versions":["1.3.8+dfsg.1-2","1.3.10+dfsg.1-1","1.4.1+dfsg.1-2","1.4.2+dfsg.1-1","1.4.2+dfsg.1-2","1.4.3+dfsg.1-1","1.4.3+dfsg.1-1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_name":"roundcube","binary_version":"1.4.3+dfsg.1-1ubuntu0.1~esm2"},{"binary_name":"roundcube-core","binary_version":"1.4.3+dfsg.1-1ubuntu0.1~esm2"},{"binary_name":"roundcube-mysql","binary_version":"1.4.3+dfsg.1-1ubuntu0.1~esm2"},{"binary_name":"roundcube-pgsql","binary_version":"1.4.3+dfsg.1-1ubuntu0.1~esm2"},{"binary_name":"roundcube-plugins","binary_version":"1.4.3+dfsg.1-1ubuntu0.1~esm2"},{"binary_name":"roundcube-sqlite3","binary_version":"1.4.3+dfsg.1-1ubuntu0.1~esm2"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5182-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:20.04:LTS","cves":[{"id":"CVE-2020-15562","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-16145","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-35730","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2021-44025","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-44026","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2021-46144","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}},{"package":{"name":"roundcube","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/roundcube@1.5.0+dfsg.1-2ubuntu0.1~esm1?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.5.0+dfsg.1-2ubuntu0.1~esm1"}]}],"versions":["1.4.11+dfsg.1-4","1.5.0+dfsg.1-2"],"ecosystem_specific":{"binaries":[{"binary_name":"roundcube","binary_version":"1.5.0+dfsg.1-2ubuntu0.1~esm1"},{"binary_name":"roundcube-core","binary_version":"1.5.0+dfsg.1-2ubuntu0.1~esm1"},{"binary_name":"roundcube-mysql","binary_version":"1.5.0+dfsg.1-2ubuntu0.1~esm1"},{"binary_name":"roundcube-pgsql","binary_version":"1.5.0+dfsg.1-2ubuntu0.1~esm1"},{"binary_name":"roundcube-plugins","binary_version":"1.5.0+dfsg.1-2ubuntu0.1~esm1"},{"binary_name":"roundcube-sqlite3","binary_version":"1.5.0+dfsg.1-2ubuntu0.1~esm1"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5182-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:22.04:LTS","cves":[{"id":"CVE-2021-46144","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}