First published: Mon May 04 2020(Updated: )
rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Roundcube Webmail | >=1.2.0<1.2.10 | |
Roundcube Webmail | >=1.3.0<1.3.11 | |
Roundcube Webmail | >=1.4.0<1.4.4 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Backports SLE | =15.0-sp2 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Roundcube Roundcube Webmail | ||
>=1.2.0<1.2.10 | ||
>=1.3.0<1.3.11 | ||
>=1.4.0<1.4.4 | ||
=15.0-sp1 | ||
=15.0-sp2 | ||
=15.1 | ||
=15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12641 is a remote code execution vulnerability in Roundcube Webmail.
The CVE-2020-12641 vulnerability allows attackers to execute code by using shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
Roundcube Webmail versions 1.2.10, 1.3.11, and 1.4.4 are affected by CVE-2020-12641.
An attacker can exploit CVE-2020-12641 by injecting malicious shell metacharacters in the configuration settings for im_convert_path or im_identify_path, allowing them to execute arbitrary code.
To mitigate CVE-2020-12641, it is recommended to update Roundcube Webmail to versions 1.2.10, 1.3.11, or 1.4.4, which include security updates addressing the vulnerability.