First published: Fri Nov 19 2021(Updated: )
Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/roundcube | 1.3.17+dfsg.1-1~deb10u2 1.3.17+dfsg.1-1~deb10u3 1.4.14+dfsg.1-1~deb11u1 1.4.13+dfsg.1-1~deb11u1 1.6.3+dfsg-1~deb12u1 1.6.4+dfsg-1 | |
Roundcube Webmail | <1.3.17 | |
Roundcube Webmail | >=1.4.0<1.4.12 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Roundcube Roundcube Webmail | ||
<1.3.17 | ||
>=1.4.0<1.4.12 | ||
=33 | ||
=34 | ||
=9.0 | ||
=10.0 | ||
=11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44026 is a vulnerability known as Roundcube Webmail SQL Injection Vulnerability.
The Roundcube Webmail SQL Injection vulnerability allows an attacker to inject SQL commands via search or search_params and potentially gain unauthorized access to the database.
Roundcube Webmail versions 1.4.11 and earlier, and versions 1.3.16 and earlier, are affected by this vulnerability.
To fix the Roundcube Webmail SQL Injection vulnerability, update to version 1.4.12 or 1.3.17, which contain the necessary security patches.
The severity of CVE-2021-44026 is high.