<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for roundcubemail</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:0257-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-08-21T11:35:59Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-08-21T11:35:59Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-08-21T11:35:59Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for roundcubemail</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for roundcubemail fixes the following issues:

Update to 1.6.7

This is a security update to the stable version 1.6 of Roundcube Webmail.
It provides a fix to a recently reported XSS vulnerabilities:

  * Fix cross-site scripting (XSS) vulnerability in handling SVG animate attributes.
    Reported by Valentin T. and Lutz Wolf of CrowdStrike.
  * Fix cross-site scripting (XSS) vulnerability in handling list columns from user preferences.
    Reported by Huy Nguyễn Phạm Nhật.
  * Fix command injection via crafted im_convert_path/im_identify_path on Windows.
    Reported by Huy Nguyễn Phạm Nhật.

  CHANGELOG

  * Makefile: Use phpDocumentor v3.4 for the Framework docs (#9313)
  * Fix bug where HTML entities in URLs were not decoded on HTML to plain text conversion (#9312)
  * Fix bug in collapsing/expanding folders with some special characters in names (#9324)
  * Fix PHP8 warnings (#9363, #9365, #9429)
  * Fix missing field labels in CSV import, for some locales (#9393)
  * Fix cross-site scripting (XSS) vulnerability in handling SVG animate attributes
  * Fix cross-site scripting (XSS) vulnerability in handling list columns from user preferences
  * Fix command injection via crafted im_convert_path/im_identify_path on Windows

Update to 1.6.6:

  * Fix regression in handling LDAP search_fields configuration parameter (#9210)
  * Enigma: Fix finding of a private key when decrypting a message using GnuPG v2.3
  * Fix page jump menu flickering on click (#9196)
  * Update to TinyMCE 5.10.9 security release (#9228)
  * Fix PHP8 warnings (#9235, #9238, #9242, #9306)
  * Fix saving other encryption settings besides enigma's (#9240)
  * Fix unneeded php command use in installto.sh and deluser.sh scripts (#9237)
  * Fix TinyMCE localization installation (#9266)
  * Fix bug where trailing non-ascii characters in email addresses 
    could have been removed in recipient input (#9257)
  * Fix IMAP GETMETADATA command with options - RFC5464

Update to 1.6.5 (boo#1216895):

  * Fix cross-site scripting (XSS) vulnerability in setting 
    Content-Type/Content-Disposition for attachment 
    preview/download  CVE-2023-47272

  Other changes:

  * Fix PHP8 fatal error when parsing a malformed BODYSTRUCTURE (#9171)
  * Fix duplicated Inbox folder on IMAP servers that do not use Inbox 
    folder with all capital letters (#9166)
  * Fix PHP warnings (#9174)
  * Fix UI issue when dealing with an invalid managesieve_default_headers 
    value (#9175)
  * Fix bug where images attached to application/smil messages 
    weren't displayed (#8870)
  * Fix PHP string replacement error in utils/error.php (#9185)
  * Fix regression where smtp_user did not allow pre/post strings 
    before/after %u placeholder (#9162)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2024-257</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JQ3GTO6YI3BLAIR7PQZYZ5LRFR7OKTWN/</URL>
      <Description>E-Mail link for openSUSE-SU-2024:0257-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1216895</URL>
      <Description>SUSE Bug 1216895</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-47272/</URL>
      <Description>SUSE CVE CVE-2023-47272 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP5">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP5">
        <FullProductName ProductID="SUSE Package Hub 15 SP5">SUSE Package Hub 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="roundcubemail-1.6.7-bp155.2.9.1">
      <FullProductName ProductID="roundcubemail-1.6.7-bp155.2.9.1">roundcubemail-1.6.7-bp155.2.9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="roundcubemail-1.6.7-bp155.2.9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Package Hub 15 SP5:roundcubemail-1.6.7-bp155.2.9.1">roundcubemail-1.6.7-bp155.2.9.1 as a component of SUSE Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="roundcubemail-1.6.7-bp155.2.9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:roundcubemail-1.6.7-bp155.2.9.1">roundcubemail-1.6.7-bp155.2.9.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Roundcube 1.5.x before 1.5.6 and 1.6.x before 1.6.5 allows XSS via a Content-Type or Content-Disposition header (used for attachment preview or download).</Note>
    </Notes>
    <CVE>CVE-2023-47272</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP5:roundcubemail-1.6.7-bp155.2.9.1</ProductID>
        <ProductID>openSUSE Leap 15.5:roundcubemail-1.6.7-bp155.2.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JQ3GTO6YI3BLAIR7PQZYZ5LRFR7OKTWN/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-47272.html</URL>
        <Description>CVE-2023-47272</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216895</URL>
        <Description>SUSE Bug 1216895</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
