rcube_utils.php in Roundcube before 1.1.8 and 1.2.x before 1.2.4 is susceptible to a cross-site scripting vulnerability via a crafted Cascading Style Sheets (CSS) token sequence within an SVG element.
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "roundcube",
"binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm7"
},
{
"binary_name": "roundcube-core",
"binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm7"
},
{
"binary_name": "roundcube-mysql",
"binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm7"
},
{
"binary_name": "roundcube-pgsql",
"binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm7"
},
{
"binary_name": "roundcube-plugins",
"binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm7"
},
{
"binary_name": "roundcube-sqlite3",
"binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm7"
}
]
}