IMAP command injection in Roundcube



Published: 2018-04-22
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-9846
CWE-ID CWE-77
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Roundcube
Web applications / Webmail solutions

Vendor Roundcube

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Command injection

EUVDB-ID: #VU12078

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-9846

CWE-ID: CWE-77 - Command injection

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary IMAP command.

The vulnerability exists in Roundcube when processing user-supplied data passed via the "_uid" HTTP GET parameter to archive.php script. A remote authenticated attacker can execute arbitrary IMAP command after "%0d%0a" characters.

Successful exploitation of the vulnerability may allow an attacker to gain unauthorized access to email messages of other users.

Mitigation

Update to version 1.1.11, 1.2.8 or 1.3.6.

Vulnerable software versions

Roundcube: 1.1.0 - 1.3.5

External links

http://roundcube.net/news/2018/04/11/security-update-1.3.6
http://roundcube.net/news/2018/04/17/security-updates-1.2.8-1.1.11


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###