7.5
CVSSv2

CVE-2013-6172

Published: 05/11/2013 Updated: 26/03/2014
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

steps/utils/save_pref.inc in Roundcube webmail prior to 0.8.7 and 0.9.x prior to 0.9.5 allows remote malicious users to modify configuration settings via the _session parameter, which can be leveraged to read arbitrary files, conduct SQL injection attacks, and execute arbitrary code.

Vulnerable Product Search on Vulmon Subscribe to Product

roundcube webmail 0.9

roundcube webmail 0.8.2

roundcube webmail 0.8.1

roundcube webmail 0.5.3

roundcube webmail 0.5.2

roundcube webmail 0.4

roundcube webmail 0.2.1

roundcube webmail 0.2

roundcube webmail 0.1

roundcube webmail 0.9.3

roundcube webmail 0.9.2

roundcube webmail

roundcube webmail 0.8.5

roundcube webmail 0.7.2

roundcube webmail 0.7.1

roundcube webmail 0.7

roundcube webmail 0.5

roundcube webmail 0.3

roundcube webmail 0.1.1

roundcube webmail 0.9.1

roundcube webmail 0.9.0

roundcube webmail 0.8.4

roundcube webmail 0.8.3

roundcube webmail 0.6

roundcube webmail 0.5.4

roundcube webmail 0.4.2

roundcube webmail 0.4.1

roundcube webmail 0.2.2

roundcube webmail 0.9.4

roundcube webmail 0.8.0

roundcube webmail 0.7.3

roundcube webmail 0.5.1

roundcube webmail 0.3.1

Vendor Advisories

Debian Bug report logs - #727668 roundcube: CVE-2013-6172: vulnerability in handling _session argument of utils/save-prefs Package: roundcube; Maintainer for roundcube is Debian Roundcube Maintainers <pkg-roundcube-maintainers@listsaliothdebianorg>; Source for roundcube is src:roundcube (PTS, buildd, popcon) Reported by: ...
It was discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, does not properly sanitize the _session parameter in steps/utils/save_prefinc during saving preferences The vulnerability can be exploited to overwrite configuration settings and subsequently allowing random file access, manipulated SQL queries and even co ...