<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title><![CDATA[iRedMail — Security: XSS vulnerability in roundcubemai-0.2-stable]]></title>
		<link>https://forum.iredmail.org/topic4-security-xss-vulnerability-in-roundcubemai02stable.html</link>
		<atom:link href="https://forum.iredmail.org/feed-rss-topic4.xml" rel="self" type="application/rss+xml" />
		<description><![CDATA[The most recent posts in Security: XSS vulnerability in roundcubemai-0.2-stable.]]></description>
		<lastBuildDate>Wed, 20 May 2009 16:39:06 +0000</lastBuildDate>
		<generator>PunBB</generator>
		<item>
			<title><![CDATA[Re: Security: XSS vulnerability in roundcubemai-0.2-stable]]></title>
			<link>https://forum.iredmail.org/post122.html#p122</link>
			<description><![CDATA[<p>Successfully applied.</p>]]></description>
			<author><![CDATA[null@example.com (gscott187)]]></author>
			<pubDate>Wed, 20 May 2009 16:39:06 +0000</pubDate>
			<guid>https://forum.iredmail.org/post122.html#p122</guid>
		</item>
		<item>
			<title><![CDATA[Re: Security: XSS vulnerability in roundcubemai-0.2-stable]]></title>
			<link>https://forum.iredmail.org/post29.html#p29</link>
			<description><![CDATA[<p>Thank you.</p>]]></description>
			<author><![CDATA[null@example.com (nothingelse)]]></author>
			<pubDate>Thu, 07 May 2009 14:15:35 +0000</pubDate>
			<guid>https://forum.iredmail.org/post29.html#p29</guid>
		</item>
		<item>
			<title><![CDATA[Security: XSS vulnerability in roundcubemai-0.2-stable]]></title>
			<link>https://forum.iredmail.org/post6.html#p6</link>
			<description><![CDATA[<p>Hi, all.</p><p>All users use iRedMail-0.4.0 which ships roundcubemail-0.2-stable should<br />apply this patch *as soon as possible*.</p><p>Description:</p><p>&nbsp; &nbsp;There&#039;s a cross-site scripting (XSS) vulnerability in RoundCube<br />&nbsp; &nbsp;Webmail (roundcubemail) 0.2 stable allows remote attackers to inject<br />&nbsp; &nbsp;arbitrary web script or HTML via the background attribute embedded<br />&nbsp; &nbsp;in an HTML e-mail message.</p><p>Reference:</p><p>&nbsp; &nbsp;* CVE-2009-0413<br />&nbsp; &nbsp; &nbsp;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0413">http://cve.mitre.org/cgi-bin/cvename.cg … -2009-0413</a></p><p>Patch attachted. Please follow the steps to apply it.</p><p>&nbsp; &nbsp;* Backup your current roundcubemail directory. e.g. copy the whole<br />&nbsp; &nbsp; &nbsp;directory to /opt/backup/.</p><div class="codebox"><pre><code># cp -rfp /var/www/roundcubemail-0.2-stable/ /opt/backup/</code></pre></div><p>&nbsp; &nbsp;* Download the patch, upload it to your mail server. We assume<br />&nbsp; &nbsp; &nbsp;you upload it to /opt/</p><p>&nbsp; &nbsp;* Change directory and apply the patch:</p><div class="codebox"><pre><code># cd /var/www/roundcubemail-0.2-stable/
# patch -p1 &lt; /opt/roundcubemail-CVE-2009-0413.patch
patching file program/lib/washtml.php</code></pre></div>]]></description>
			<author><![CDATA[null@example.com (ZhangHuangbin)]]></author>
			<pubDate>Wed, 06 May 2009 10:27:35 +0000</pubDate>
			<guid>https://forum.iredmail.org/post6.html#p6</guid>
		</item>
	</channel>
</rss>
