Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-16651


Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.


Published

2017-11-09T14:29:00.267

Last Modified

2025-04-20T01:37:25.860

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

3.9

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-552
  • Type: Secondary
    CWE-552

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application roundcube webmail ≤ 1.1.9 Yes
Application roundcube webmail 1.2.0 Yes
Application roundcube webmail 1.2.1 Yes
Application roundcube webmail 1.2.2 Yes
Application roundcube webmail 1.2.3 Yes
Application roundcube webmail 1.2.4 Yes
Application roundcube webmail 1.2.5 Yes
Application roundcube webmail 1.2.6 Yes
Application roundcube webmail 1.3.0 Yes
Application roundcube webmail 1.3.1 Yes
Application roundcube webmail 1.3.2 Yes
Operating System debian debian_linux 7.0 Yes
Operating System debian debian_linux 9.0 Yes

References