#VU28980 Improper Neutralization of Argument Delimiters in a Command in Roundcube - CVE-2020-12641
Published: June 11, 2020 / Updated: June 20, 2023
Roundcube
Roundcube
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists in rcube_image.php script when processing shell metacharacters in a configuration setting for im_convert_path or im_identify_path. A remote user with ability to change Roundcube Webmail configuration can inject and execute arbitrary OS commands.
Remediation
External links
- https://github.com/roundcube/roundcubemail/commit/fcfb099477f353373c34c8a65c9035b06b364db3
- https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.4
- https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10
- https://www.recordedfuture.com/bluedelta-exploits-ukrainian-government-roundcube-mail-servers