[CDP-development] TLP: GREEN (Vulnerability Alert Notification) - CVE-2023-43770: Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability

CSS Security Operations Services * DAS css-soc-services at das.oregon.gov
Mon Feb 12 12:21:55 PST 2024


Good afternoon,

The SOC Services team is reporting on the vulnerability: CVE-2023-43770: Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability. Due to its high visibility and knowledge of the software installed in the state environment, we are providing this in-depth information:


History: On September 5, 2023, Google released an update for Chromium fixing CVE-2023-4762. CVE-2023-4762 has been assigned an CVSS score of 6.1. A CVE was established on September 22, 2023, and CISA added the vulnerabilities to their list of Known Exploited Vulnerabilities on February 12, 2024. CVE-2023-43770 is described as a cross-site scripting (XSS) vulnerability in Roundcube, a skinnable AJAX based webmail solution for IMAP servers,which could lead to information disclosure via malicious link references in plain/text messages.

Affected versions:

  *   roundcube/1.6.2+dfsg-1
  *   roundcube/1.4.13+dfsg.1-1~deb11u1
  *   roundcube/ 1.6.1+dfsg-1
Fixed Versions:

  *   roundcube/1.6.3+dfsg-1
  *   roundcube/1.4.14+dfsg.1-1~deb11u1
  *   roundcube/1.6.3+dfsg-1~deb12u1

The Security update regarding CVE-2023-43770 from Roundcube can be found here: https://roundcube.net/news/2023/09/15/security-update-1.6.3-released

Intelligence: As of February 12, 2024, the vulnerability has been confirmed as being exploited in the wild.

Workarounds: There are no workarounds for this vulnerability.

How it works: Roundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that can lead to information disclosure via malicious link references in plain/text messages.

Post-Exploit: Upon successful exploitation of the vulnerability, it can lead to information disclosure via malicious link references in plain/text messages.

As of February 12, 2024, the following vulnerability plugin has been released and is currently in Tenable Security Center:
Plugin
Title
Severity
181792<https://www.tenable.com/plugins/nessus/181792>
Debian DLA-3577-1 : roundcube - LTS security update
Medium


Recommended Actions:


  *   Verify host has not been compromised before applying patches.
  *   Apply appropriate updates provided by vendor to vulnerable systems immediately after appropriate testing.
  *   Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  *   Apply the Principle of Least Privilege to all systems and services.


[cid:image001.png at 01DA58DE.3E2A1420]
Cyber Security Services
State of Oregon Cyber Security Services
Enterprise Information Services | SOC
Cyber Security Services (CSS)
SOC Hotline: (503) 378-5930 | SOC Services (503) 373-0378
"Ensuring user-friendly, reliable and secure state technology systems that serve Oregonians."


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://omls.oregon.gov/pipermail/cdp-development/attachments/20240212/d130c03d/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.png
Type: image/png
Size: 21907 bytes
Desc: image001.png
URL: <https://omls.oregon.gov/pipermail/cdp-development/attachments/20240212/d130c03d/attachment-0001.png>


More information about the CDP-development mailing list