First published: Tue Nov 05 2013(Updated: )
steps/utils/save_pref.inc in Roundcube webmail before 0.8.7 and 0.9.x before 0.9.5 allows remote attackers to modify configuration settings via the _session parameter, which can be leveraged to read arbitrary files, conduct SQL injection attacks, and execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Roundcube Webmail | <=0.8.6 | |
Roundcube Webmail | =0.1 | |
Roundcube Webmail | =0.1-20050811 | |
Roundcube Webmail | =0.1-20050820 | |
Roundcube Webmail | =0.1-20051007 | |
Roundcube Webmail | =0.1-20051021 | |
Roundcube Webmail | =0.1-alpha | |
Roundcube Webmail | =0.1-beta | |
Roundcube Webmail | =0.1-beta2 | |
Roundcube Webmail | =0.1-rc1 | |
Roundcube Webmail | =0.1-rc2 | |
Roundcube Webmail | =0.1-stable | |
Roundcube Webmail | =0.1.1 | |
Roundcube Webmail | =0.2 | |
Roundcube Webmail | =0.2-alpha | |
Roundcube Webmail | =0.2-beta | |
Roundcube Webmail | =0.2-stable | |
Roundcube Webmail | =0.2.1 | |
Roundcube Webmail | =0.2.2 | |
Roundcube Webmail | =0.3 | |
Roundcube Webmail | =0.3-beta | |
Roundcube Webmail | =0.3-rc1 | |
Roundcube Webmail | =0.3-stable | |
Roundcube Webmail | =0.3.1 | |
Roundcube Webmail | =0.4 | |
Roundcube Webmail | =0.4-beta | |
Roundcube Webmail | =0.4.1 | |
Roundcube Webmail | =0.4.2 | |
Roundcube Webmail | =0.5 | |
Roundcube Webmail | =0.5-beta | |
Roundcube Webmail | =0.5-rc | |
Roundcube Webmail | =0.5.1 | |
Roundcube Webmail | =0.5.2 | |
Roundcube Webmail | =0.5.3 | |
Roundcube Webmail | =0.5.4 | |
Roundcube Webmail | =0.6 | |
Roundcube Webmail | =0.7 | |
Roundcube Webmail | =0.7.1 | |
Roundcube Webmail | =0.7.2 | |
Roundcube Webmail | =0.7.3 | |
Roundcube Webmail | =0.8.0 | |
Roundcube Webmail | =0.8.1 | |
Roundcube Webmail | =0.8.2 | |
Roundcube Webmail | =0.8.3 | |
Roundcube Webmail | =0.8.4 | |
Roundcube Webmail | =0.8.5 | |
Roundcube Webmail | =0.9-beta | |
Roundcube Webmail | =0.9-rc | |
Roundcube Webmail | =0.9-rc2 | |
Roundcube Webmail | =0.9.0 | |
Roundcube Webmail | =0.9.1 | |
Roundcube Webmail | =0.9.2 | |
Roundcube Webmail | =0.9.3 | |
Roundcube Webmail | =0.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6172 has been classified as a high severity vulnerability due to its potential to allow unauthorized configuration modifications and code execution.
To fix CVE-2013-6172, you should upgrade Roundcube webmail to version 0.8.7 or 0.9.5 or later.
CVE-2013-6172 can be exploited to conduct SQL injection attacks, read arbitrary files, and execute arbitrary code.
CVE-2013-6172 affects all versions of Roundcube webmail prior to 0.8.7 and 0.9.x versions before 0.9.5.
There are no official workarounds for CVE-2013-6172, and upgrading to the latest version is the recommended solution.