Lucene search

K
gentooGentoo FoundationGLSA-201402-15
HistoryFeb 11, 2014 - 12:00 a.m.

Roundcube: Arbitrary code execution

2014-02-1100:00:00
Gentoo Foundation
security.gentoo.org
17

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.016

Percentile

87.6%

Background

Roundcube is a browser-based multilingual IMAP client with an application-like user interface.

Description

A vulnerability in steps/utils/save_pref.inc allows remote attackers to use the _session parameter to change configuration settings.

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process, inject SQL code, or read arbitrary files.

Workaround

There is no known workaround at this time.

Resolution

All Roundcube 0.9 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=mail-client/roundcube-0.9.5"

All Roundcube 0.8 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=mail-client/roundcube-0.8.7"
OSVersionArchitecturePackageVersionFilename
Gentooanyallmail-client/roundcube< 0.9.5UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.016

Percentile

87.6%