
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A Cross-Site Scripting (XSS) vulnerability was discovered in Roundcube, affecting versions through 1.5.7 and 1.6.x through 1.6.7. The vulnerability exists in the rcmailactionmail_get->run() function, which allows a remote attacker to steal and send emails of a victim via a malicious e-mail attachment served with a dangerous Content-Type header. The vulnerability was discovered by Oskar Zeino-Mahmalat from Sonar and was patched in versions 1.6.8 and 1.5.8 released on August 4, 2024 (Sonar Blog, Roundcube News).
The vulnerability has been assigned a CVSS v3.1 Base Score of 9.3 CRITICAL with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N. The issue stems from insufficient handling of Content-Type headers in email attachments. When a victim views a malicious email in Roundcube, the attacker can execute arbitrary JavaScript in the victim's browser through the unsafe handling of attachment content types. The vulnerability is particularly concerning as it requires minimal user interaction - for CVE-2024-42008, only a single click by the victim is needed, and the attacker can make this interaction unobvious (Sonar Blog, NVD).
The vulnerability allows attackers to steal emails, contacts, and the victim's email password, as well as send emails from the victim's account. Attackers can gain a persistent foothold in the victim's browser across restarts, enabling continuous email exfiltration. This is particularly concerning for government agencies and organizations using Roundcube, as it could lead to unauthorized access to sensitive communications (Sonar Blog).
The vulnerability has been patched in Roundcube versions 1.6.8 and 1.5.8. Administrators are strongly advised to update their installations immediately. Users who suspect they are affected should change their email passwords and clear the site data of the Roundcube site they are using in their browser. The fix includes converting dangerous MIME types to harmless text/plain and implementing a restrictive Content Security Policy for attachments (Roundcube News, Sonar Blog).
The security community has expressed significant concern about this vulnerability, particularly given Roundcube's widespread use in government agencies and academic institutions. The discovery has highlighted the ongoing security challenges faced by web-based email systems and the importance of proper content sanitization. The vulnerability received considerable attention due to its critical severity and the potential for exploitation by APT groups (Sonar Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”