roundcubemail: Cross-site Scripting issue in email attachments (CVE-2018-19206)
steps/mail/func.inc in Roundcube before 1.3.8 has XSS via crafted use of
, as demonstrated by an onload attribute in a BODY element, within an HTML attachment. ### References: https://github.com/roundcube/roundcubemail/issues/6410 https://nvd.nist.gov/vuln/detail/CVE-2018-19206 ### Patch: https://github.com/roundcube/roundcubemail/commit/102fbf1169116fef32a940b9fb1738bc45276059 *(from redmine: issue id 9695, created on 2018-11-26, closed on 2018-12-04)* * Relations: * child #9696 (closed) * child #9697 (closed)