(#Several vulnerabilities were reported in RoundCube:#- CVE-2015-8105: cross-site scripting located in the drag-n-drop file upload feature##- directory traversal allowing an attacker to access content of subdirectories "bin", "logs", "config" dans "temp" of the application. This vulnerability stems from allowed access in the roundcube configuration file for Apache "/etc/apache2/conf.d/roundcubemail.conf"###)
Vulnerable Products
Vulnerable OS: openSUSE (SUSE) - 13.1, 13.2, 42.1
Solution
Fixed roundcubemail packages for openSUSE Leap 42.1 are available.