CVE-2007-6321
Roundcube Webmail 0.1 - CSS Expression Input Validation
Severity Score
4.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
5
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Cross-site scripting (XSS) vulnerability in RoundCube webmail 0.1rc2, 2007-12-09, and earlier versions, when using Internet Explorer, allows remote attackers to inject arbitrary web script or HTML via style sheets containing expression commands.
Vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en RoundCube webmail 0.1rc2, 2007-12-09, y versiones anteriores, cuando utiliza Internet Explorer, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de expresión que contiene los comandos.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-11-10 First Exploit
- 2007-12-11 CVE Reserved
- 2007-12-12 CVE Published
- 2024-08-07 CVE Updated
- 2024-10-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/30734 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/484802/100/0/threaded | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/38981 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/30877 | 2007-11-10 | |
http://openmya.hacker.jp/hasegawa/security/expression.txt | 2024-08-07 | |
http://securityreason.com/securityalert/3435 | 2024-08-07 | |
http://trac.roundcube.net/ticket/1484701 | 2024-08-07 | |
http://www.securityfocus.com/bid/26800 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|