Security restrictions bypass in Roundcube



| Updated: 2017-07-12
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-8114
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Roundcube
Web applications / Webmail solutions

Vendor Roundcube

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU7478

Risk: Low

CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-8114

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote authenticated attacker to bypass security restrictions.

The weakness exists due to improper restriction of exec call in the virtualmin and sasl drivers of the password plugin. A remote attcker can arbitrarily reset passwords, bypass security restrictions and gain elevated privileges on the system.

Successful exploitation of the vulnerability results in privilege escalation.

Mitigation

Update to version 1.0.11, 1.1.9 or 1.2.5.

Vulnerable software versions

Roundcube: 0.1 - 1.2.4

CPE2.3 External links

https://github.com/ilsani/rd/tree/master/security-advisories/web/roundcube/cve-2017-8114


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###