Bug 26586

Summary: roundcubemail new security issues CVE-2020-1262[56]
Product: Mageia Reporter: Marc Krämer <mageia>
Component: SecurityAssignee: QA Team <qa-bugs>
Status: RESOLVED FIXED QA Contact: Sec team <security>
Severity: normal    
Priority: Normal CC: andrewsfarm, herman.viaene, luigiwalser, mageia, sysadmin-bugs, tmb
Version: 7Keywords: advisory, validated_update
Target Milestone: ---   
Hardware: All   
OS: Linux   
Whiteboard: MGA7-64-OK
Source RPM: roundcubemail-1.3.10-1.mga7.src.rpm CVE:
Status comment:

Description Marc Krämer 2020-05-04 18:17:15 CEST
- Cross-Site Scripting (XSS) via malicious HTML content
- CSRF attack can cause an authenticated user to be logged out
- Remote code execution via crafted config options
- Path traversal vulnerability allowing local file inclusion via crafted 'plugins' option
Comment 1 Marc Krämer 2020-05-04 19:15:05 CEST
Updated roundcubemail packages fix security vulnerabilities:

- Cross-Site Scripting (XSS) via malicious HTML content
- CSRF attack can cause an authenticated user to be logged out
- Remote code execution via crafted config options
- Path traversal vulnerability allowing local file inclusion via crafted 'plugins' option


References:
https://github.com/roundcube/roundcubemail/releases/tag/1.3.11
========================

Updated packages in core/updates_testing:
========================
roundcubemail-1.3.11-1.mga7.noarch.rpm

SRPM:
roundcubemail-1.3.11-1.mga7.src.rpm

Assignee: mageia => qa-bugs

Comment 2 Herman Viaene 2020-05-05 10:51:19 CEST
MGA7-64 Plasma on Lenovo B50
No installation issues.
Ref to bug 22941 Comment 10 and 23826 Comment 10 for testing.
Success configuring roundcubemail for my gmail account, sent mail to my hotmail account (read on my desktop PC) and receiving answer from it.
So roundcube does its thing. OK for me.

CC: (none) => herman.viaene
Whiteboard: (none) => MGA7-64-OK

Comment 3 PC LX 2020-05-06 11:52:23 CEST
Installed and tested without issue.


Tested using dovecot imap server. Several accounts with large number of folders and emails.


System: Mageia 7, x86_64, Firefox, Chromium, Chrome, Plasma DE, LXQt DE, Intel CPU, nVidia GPU using nvidia240 proprietary driver.


$ uname -a
Linux marte 5.6.8-desktop-1.mga7 #1 SMP Thu Apr 30 06:12:53 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
$ rpm -q roundcubemail
roundcubemail-1.3.11-1.mga7

CC: (none) => mageia

Comment 4 David Walser 2020-05-06 20:14:56 CEST
Debian has issued an advisory for this on May 5:
https://www.debian.org/security/2020/dsa-4674

Updated roundcubemail packages fix security vulnerabilities:

- Cross-Site Scripting (XSS) via malicious HTML content (CVE-2020-12625)
- CSRF attack can cause an authenticated user to be logged out (CEV-2020-12626)
- Remote code execution via crafted config options
- Path traversal vulnerability allowing local file inclusion via crafted 'plugins' option


References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12626
https://github.com/roundcube/roundcubemail/releases/tag/1.3.11
https://www.debian.org/security/2020/dsa-4674

Summary: Security issues in roundcube mail => roundcubemail new security issues CVE-2020-1262[56]

Comment 5 Thomas Andrews 2020-05-07 15:55:57 CEST
Validating. Advisory in Comment 1.

Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Comment 6 David Walser 2020-05-07 16:00:51 CEST
You mean Comment 4.
Comment 7 Thomas Andrews 2020-05-07 17:40:51 CEST
OK.  It had been a looooonnnnng day on the tractor, and I was tired.
Thomas Backlund 2020-05-08 12:02:48 CEST

Keywords: (none) => advisory
CC: (none) => tmb

Comment 8 Mageia Robot 2020-05-08 12:59:17 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2020-0206.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

Comment 9 David Walser 2020-09-25 00:59:28 CEST
This update also fixed CVE-2020-12640:
https://bugzilla.suse.com/show_bug.cgi?id=1171149
https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html

CC: (none) => luigiwalser