7.8

CVE-2017-16651

Warnung
Exploit

Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
RoundcubeWebmail Version <= 1.1.9
RoundcubeWebmail Version1.2.0
RoundcubeWebmail Version1.2.1
RoundcubeWebmail Version1.2.2
RoundcubeWebmail Version1.2.3
RoundcubeWebmail Version1.2.4
RoundcubeWebmail Version1.2.5
RoundcubeWebmail Version1.2.6
RoundcubeWebmail Version1.3.0
RoundcubeWebmail Version1.3.1
RoundcubeWebmail Version1.3.2
DebianDebian Linux Version7.0
DebianDebian Linux Version9.0

03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog

Roundcube Webmail File Disclosure Vulnerability

Schwachstelle

Roundcube Webmail contains a file disclosure vulnerability caused by insufficient input validation in conjunction with file-based attachment plugins, which are used by default.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 30.53% 0.965
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 4.6 3.9 6.4
AV:L/AC:L/Au:N/C:P/I:P/A:P
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-552 Files or Directories Accessible to External Parties

The product makes files or directories accessible to unauthorized actors, even though they should not be.