[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-1904Date: (C)2014-02-11   (M)2023-12-22


Absolute path traversal vulnerability in steps/mail/sendmail.inc in Roundcube Webmail before 0.7.3 and 0.8.x before 0.8.6 allows remote attackers to read arbitrary files via a full pathname in the _value parameter for the generic_message_footer setting in a save-perf action to index.php, as exploited in the wild in March 2013.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
http://lists.roundcube.net/pipermail/dev/2013-March/022328.html
http://www.openwall.com/lists/oss-security/2013/03/28/8
http://habrahabr.ru/post/174423/
http://sourceforge.net/p/roundcubemail/news/2013/03/security-updates-086-and-073/
openSUSE-SU-2013:0671

CPE    44
cpe:/a:roundcube:webmail:0.8.2
cpe:/a:roundcube:webmail:0.3:beta
cpe:/a:roundcube:webmail:0.1:beta2
cpe:/a:roundcube:webmail:0.8.3
...
CWE    1
CWE-22
OVAL    3
oval:org.secpod.oval:def:104819
oval:org.secpod.oval:def:104798
oval:org.secpod.oval:def:1300186

© SecPod Technologies