OS Command Injection in Roundcube - CVE-2024-37385

 

OS Command Injection in Roundcube - CVE-2024-37385

Published: May 21, 2024 / Updated: June 26, 2024


Vulnerability identifier: #VU89683
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2024-37385
CWE-ID: CWE-78
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Roundcube
Software vendor:
Roundcube

Description

The vulnerability allows a local user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation when handling values for the "im_convert_path" and "im_identify_path" options on Windows. A local user with ability to edit the configuration file can execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links