Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Detected network exploitation of CVE-2024-37383 relating to Roundcube Webmail (AL01/241025/CSIRT-ITA)

Detected network exploitation of CVE-2024-37383 relating to Roundcube Webmail (AL01/241025/CSIRT-ITA)

Summary

Active network exploitation of vulnerability CVE-2024-37383 – already remedied by the vendor – affecting the Roundcube Webmail product, a popular open source e-mail manager, was detected.

Risk

Estimated impact of the vulnerability on the target community: HIGH/ORANGE (70.64/100)1.

Type

  • Information Disclosure
  • Privilege Escalation

Description

The exploitation of vulnerability CVE-2024-37383 – already remediated by the vendor – affecting the Roundcube Webmail product, a well-known open source e-mail manager, was recently detected.

This vulnerability – of the ‘Cross Site Scripting’ type and with a CVSS v3 score of 6.1 – could allow a remote malicious user to execute arbitrary JavaScript code, access sensitive information, and elevate privileges on target systems.

Affected products and versions

Roundcube Webmail

  • 1.6.x, versions prior to 1.6.7
  • All versions prior to 1.5.7

Mitigation Actions

If not already done, it is recommended that vulnerable products be updated according to the security bulletin in the References section.

Unique Vulnerability Indicators

CVE-2024-37383

References

https://github.com/roundcube/roundcubemail/releases

https://lists.debian.org/debian-lts-announce/2024/06/msg00008.html

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoCs, prevalence of the affected software/devices in the relevant community.

Recommended to you

Search in 365TRUST

Our services