[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

102010

 
 

909

 
 

80911

 
 

121

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2017-16651Date: (C)2017-11-10   (M)2018-02-19


Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score  : 7.8CVSS Score  : 4.6
Exploit Score: 1.8Exploit Score: 3.9
Impact Score : 5.9Impact Score : 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  





Reference:
BID-101793
DSA-4030
https://lists.debian.org/debian-lts-announce/2017/11/msg00039.html
https://github.com/roundcube/roundcubemail/issues/6026
https://github.com/roundcube/roundcubemail/releases/tag/1.1.10
https://github.com/roundcube/roundcubemail/releases/tag/1.2.7
https://github.com/roundcube/roundcubemail/releases/tag/1.3.3
https://roundcube.net/news/2017/11/08/security-updates-1.3.3-1.2.7-and-1.1.10

CWE    1
CWE-284
OVAL    3
oval:org.secpod.oval:def:113446
oval:org.secpod.oval:def:113671
oval:org.secpod.oval:def:603165

© 2013 SecPod Technologies