CVE-2024-57004

6.1 MEDIUM

📋 TL;DR

This Cross-Site Scripting (XSS) vulnerability in Roundcube Webmail allows authenticated users to upload malicious files as email attachments. When recipients view these emails in their SENT folder, the XSS payload executes, potentially stealing session cookies or performing unauthorized actions. Only Roundcube Webmail 1.6.9 installations with authenticated user access are affected.

💻 Affected Systems

Products:
  • Roundcube Webmail
Versions: 1.6.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; self-hosted Roundcube instances are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal admin session cookies, take over accounts, access sensitive emails, and pivot to internal systems.

🟠

Likely Case

Authenticated attackers steal other users' session cookies to impersonate them and access their email accounts.

🟢

If Mitigated

With proper input validation and output encoding, the XSS payload would be neutralized before execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user credentials; proof-of-concept available on GitHub.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.10 or later

Vendor Advisory: https://github.com/roundcube/roundcubemail/releases/tag/1.6.9

Restart Required: No

Instructions:

1. Backup your Roundcube installation and database. 2. Download the latest version from roundcube.net. 3. Replace the existing files with the new version. 4. Run any database update scripts if required.

🔧 Temporary Workarounds

Disable file uploads

all

Temporarily disable attachment uploads in Roundcube configuration

Edit config.inc.php and set: $config['enable_attachments'] = false;

Implement WAF rules

linux

Add web application firewall rules to block malicious file uploads

Add ModSecurity rule: SecRule FILES_TMPNAMES "@rx malicious_pattern" "deny,status:403"

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact
  • Enable file type validation and restrict uploads to specific safe extensions

🔍 How to Verify

Check if Vulnerable:

Check if Roundcube version is 1.6.9 using the version check command

Check Version:

grep -r 'Version' /path/to/roundcube/program/include/iniset.php | grep -o '[0-9]\+\.[0-9]\+\.[0-9]\+'

Verify Fix Applied:

Verify installation is version 1.6.10 or later and test file upload functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with suspicious extensions
  • Multiple failed login attempts followed by successful uploads

Network Indicators:

  • HTTP POST requests with malicious script content in file uploads

SIEM Query:

source="roundcube.log" ("attachment" AND "upload") AND ("script" OR "javascript" OR "onload=")

🔗 References

📤 Share & Export