rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
2020-05-04T15:15:14.417
2025-03-14T17:19:14.653
Analyzed
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | roundcube | webmail | < 1.2.10 | Yes |
Application | roundcube | webmail | < 1.3.11 | Yes |
Application | roundcube | webmail | < 1.4.4 | Yes |
Application | opensuse | backports_sle | 15.0 | Yes |
Application | opensuse | backports_sle | 15.0 | Yes |
Operating System | opensuse | leap | 15.1 | Yes |
Operating System | opensuse | leap | 15.2 | Yes |