Security restrictions bypass in Roundcube



Published: 2017-04-28 | Updated: 2017-07-12
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-8114
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Roundcube
Web applications / Webmail solutions

Vendor Roundcube

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU7478

Risk: Low

CVSSv3.1: 5.5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-8114

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote authenticated attacker to bypass security restrictions.

The weakness exists due to improper restriction of exec call in the virtualmin and sasl drivers of the password plugin. A remote attcker can arbitrarily reset passwords, bypass security restrictions and gain elevated privileges on the system.

Successful exploitation of the vulnerability results in privilege escalation.

Mitigation

Update to version 1.0.11, 1.1.9 or 1.2.5.

Vulnerable software versions

Roundcube: 0.1 - 1.2.4

External links

http://github.com/ilsani/rd/tree/master/security-advisories/web/roundcube/cve-2017-8114


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###