First published: Tue May 23 2017(Updated: )
Roundcube Webmail 1.1.x before 1.1.2 allows remote attackers to obtain sensitive information by reading files in the (1) config, (2) temp, or (3) logs directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Roundcube Webmail | =1.1.1 | |
barnraiser AROUNDMe | =1.1 | |
barnraiser AROUNDMe | =1.1-beta | |
barnraiser AROUNDMe | =1.1-rc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5383 is considered a medium severity vulnerability due to its potential to expose sensitive information.
To fix CVE-2015-5383, upgrade Roundcube Webmail to version 1.1.2 or later.
Affected versions for CVE-2015-5383 include Roundcube Webmail 1.1.1 and earlier.
CVE-2015-5383 allows remote attackers to read files in the config, temp, or logs directory, potentially exposing sensitive information.
As a temporary workaround for CVE-2015-5383, consider restricting access to the config, temp, and logs directories until the update is applied.