First published: Sat Apr 29 2017(Updated: )
Roundcube Webmail allows arbitrary password resets by authenticated users. This affects versions before 1.0.11, 1.1.x before 1.1.9, and 1.2.x before 1.2.5. The problem is caused by an improperly restricted exec call in the virtualmin and sasl drivers of the password plugin.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Roundcube Webmail | <1.0.11 | |
Roundcube Webmail | >=1.1.0<1.1.9 | |
Roundcube Webmail | >=1.2.0<1.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8114 is considered a high severity vulnerability that allows authenticated users to perform arbitrary password resets.
To fix CVE-2017-8114, upgrade to Roundcube Webmail version 1.0.11 or later, 1.1.9 or later, or 1.2.5 or later.
Versions of Roundcube Webmail prior to 1.0.11, 1.1.x before 1.1.9, and 1.2.x before 1.2.5 are affected by CVE-2017-8114.
CVE-2017-8114 is caused by an improperly restricted exec call in the virtualmin and sasl drivers of the password plugin.
Authenticated users of Roundcube Webmail versions prior to the patched versions are impacted by CVE-2017-8114.