We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reported by abyszko on 9 Aug 2011 10:37 UTC as Trac ticket #1488030
During one of pen-tests I found that _mbox parameter is not properly sanitized and reflected XSS attack is possible - example
http://server/roundcube/?_mbox=%3Cscript%3Ealert(document.cookie)%3C/script%3E
I verified this on 0.5.2 and latest version from trunk.
Migrated-From: http://trac.roundcube.net/ticket/1488030
The text was updated successfully, but these errors were encountered:
Comment by @alecpl on 9 Aug 2011 13:48 UTC
I'm unable to reproduce.
Sorry, something went wrong.
Milestone changed by @alecpl on 9 Aug 2011 13:48 UTC
later => 0.6-beta
Comment by abyszko on 9 Aug 2011 14:03 UTC
Are you authenticated?
Comment by phs on 9 Aug 2011 17:37 UTC
Could reproduce it (see attachment "screenshot.png").
Comment by @alecpl on 9 Aug 2011 18:41 UTC
I think 8dd172a fixes the issue.
Status changed by @alecpl on 9 Aug 2011 18:41 UTC
new => closed
No branches or pull requests
Reported by abyszko on 9 Aug 2011 10:37 UTC as Trac ticket #1488030
During one of pen-tests I found that _mbox parameter is not properly sanitized and reflected XSS attack is possible - example
http://server/roundcube/?_mbox=%3Cscript%3Ealert(document.cookie)%3C/script%3E
I verified this on 0.5.2 and latest version from trunk.
Migrated-From: http://trac.roundcube.net/ticket/1488030
The text was updated successfully, but these errors were encountered: