8.8
CVSSv3

CVE-2018-9846

Published: 07/04/2018 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In Roundcube from versions 1.2.0 to 1.3.5, with the archive plugin enabled and configured, it's possible to exploit the unsanitized, user-controlled "_uid" parameter (in an archive.php _task=mail&_mbox=INBOX&_action=plugin.move2archive request) to perform an MX (IMAP) injection attack by placing an IMAP command after a %0d%0a sequence. NOTE: this is less easily exploitable in 1.3.4 and later because of a Same Origin Policy protection mechanism.

Vulnerable Product Search on Vulmon Subscribe to Product

roundcube webmail

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #895184 roundcube: CVE-2018-9846: check_request() bypass in archive plugin Package: src:roundcube; Maintainer for src:roundcube is Debian Roundcube Maintainers <pkg-roundcube-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 8 Apr 2018 08:3 ...
In Roundcube from versions 120 to 135, with the archive plugin enabled and configured, it's possible to exploit the unsanitized, user-controlled "_uid" parameter (in an archivephp _task=mail&_mbox=INBOX&_action=pluginmove2archive request) to perform an MX (IMAP) injection attack by placing an IMAP command after a %0d%0a sequence NOTE ...

Github Repositories

Vulnerability Management API search for exploits and CVEs in json

Read the up to date information at: watchersfirosolutionscom/apidoc Description: Json Rest API for viewing watcher and Vulnerability data Url: apifirosolutionscom Vulnsfirosolutionscom Is a webui using this api EndPoints /timesearch Description: search within a time frame Sample code: >>> imp