First published: Sat Apr 07 2018(Updated: )
In Roundcube from versions 1.2.0 to 1.3.5, with the archive plugin enabled and configured, it's possible to exploit the unsanitized, user-controlled "_uid" parameter (in an archive.php _task=mail&_mbox=INBOX&_action=plugin.move2archive request) to perform an MX (IMAP) injection attack by placing an IMAP command after a %0d%0a sequence. NOTE: this is less easily exploitable in 1.3.4 and later because of a Same Origin Policy protection mechanism.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/roundcube | 1.3.17+dfsg.1-1~deb10u2 1.3.17+dfsg.1-1~deb10u3 1.4.14+dfsg.1-1~deb11u1 1.4.13+dfsg.1-1~deb11u1 1.6.3+dfsg-1~deb12u1 1.6.4+dfsg-1 | |
Roundcube Webmail | >=1.2.0<=1.3.5 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9846 is a vulnerability in Roundcube versions 1.2.0 to 1.3.5 with the archive plugin enabled and configured.
CVE-2018-9846 has a severity score of 8.8 (high).
CVE-2018-9846 can be exploited through an MX (IMAP) injection attack using the unsanitized '_uid' parameter in the 'archive.php' file.
Roundcube versions 1.2.0 to 1.3.5 with the archive plugin enabled and configured are affected. Additionally, Roundcube Webmail and Debian Linux version 9.0 are also affected.
To fix the CVE-2018-9846 vulnerability, update Roundcube to version 1.3.17+dfsg.1-1~deb10u2, 1.3.17+dfsg.1-1~deb10u3, 1.4.14+dfsg.1-1~deb11u1, 1.4.13+dfsg.1-1~deb11u1, 1.6.3+dfsg-1~deb12u1, or 1.6.4+dfsg-1.