Date: Thu, 19 Mar 2026 07:24:22 +0000 From: Bernard Spil <brnrd@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: adef1eedd477 - main - security/vuxml: Document Roundcube vulnerabilities Message-ID: <69bba4a6.3d7b4.71ad8c95@gitrepo.freebsd.org>
index | next in thread | raw e-mail
The branch main has been updated by brnrd: URL: https://cgit.FreeBSD.org/ports/commit/?id=adef1eedd47734f0dc78449d492ac51412a998ff commit adef1eedd47734f0dc78449d492ac51412a998ff Author: Bernard Spil <brnrd@FreeBSD.org> AuthorDate: 2026-03-19 07:24:20 +0000 Commit: Bernard Spil <brnrd@FreeBSD.org> CommitDate: 2026-03-19 07:24:20 +0000 security/vuxml: Document Roundcube vulnerabilities --- security/vuxml/vuln/2026.xml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) diff --git a/security/vuxml/vuln/2026.xml b/security/vuxml/vuln/2026.xml index e3f205ccadf3..b0e3e1dfda71 100644 --- a/security/vuxml/vuln/2026.xml +++ b/security/vuxml/vuln/2026.xml @@ -1,3 +1,35 @@ + <vuln vid="c5b93cb5-2363-11f1-81da-8447094a420f"> + <topic>Roundcube -- Multiple vulnerabilities</topic> + <affects> +<package> +<name>roundcube</name> +<range><lt>1.6.14,1</lt></range> +</package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Roundcube project reports:</p> + <blockquote cite="https://github.com/roundcube/roundcubemail/releases/tag/1.6.14"> + <p>pre-auth arbitrary file write via unsafe deserialization in redis/memcache session handler</p> + <p>password could get changed without providing the old password</p> + <p>IMAP Injection + CSRF bypass in mail search</p> + <p>remote image blocking bypass via various SVG animate attributes</p> + <p>remote image blocking bypass via a crafted body background attribute</p> + <p>fixed position mitigation bypass via use of !important</p> + <p>XSS issue in a HTML attachment preview</p> + <p>SSRF + Information Disclosure via stylesheet links to a local network hosts</p> + </blockquote> + </body> + </description> + <references> + <url>https://github.com/roundcube/roundcubemail/releases/tag/1.6.14</url> + </references> + <dates> + <discovery>2026-03-18</discovery> + <entry>2026-03-19</entry> + </dates> + </vuln> + <vuln vid="db3bdcc6-377f-47d9-9ce8-4bdede4fdafe"> <topic>homebox -- multiple vulnerabilities</topic> <affects>home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69bba4a6.3d7b4.71ad8c95>
