7.8

CVE-2017-16651

Warning
Exploit

Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.

Data is provided by the National Vulnerability Database (NVD)
RoundcubeWebmail Version <= 1.1.9
RoundcubeWebmail Version1.2.0
RoundcubeWebmail Version1.2.1
RoundcubeWebmail Version1.2.2
RoundcubeWebmail Version1.2.3
RoundcubeWebmail Version1.2.4
RoundcubeWebmail Version1.2.5
RoundcubeWebmail Version1.2.6
RoundcubeWebmail Version1.3.0
RoundcubeWebmail Version1.3.1
RoundcubeWebmail Version1.3.2
DebianDebian Linux Version7.0
DebianDebian Linux Version9.0

03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog

Roundcube Webmail File Disclosure Vulnerability

Vulnerability

Roundcube Webmail contains a file disclosure vulnerability caused by insufficient input validation in conjunction with file-based attachment plugins, which are used by default.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 30.53% 0.965
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 4.6 3.9 6.4
AV:L/AC:L/Au:N/C:P/I:P/A:P
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-552 Files or Directories Accessible to External Parties

The product makes files or directories accessible to unauthorized actors, even though they should not be.