Lucene search

K
cveMitreCVE-2017-16651
HistoryNov 09, 2017 - 2:29 p.m.

CVE-2017-16651

2017-11-0914:29:00
CWE-552
mitre
web.nvd.nist.gov
934
In Wild
roundcube webmail
unauthorized access
cve-2017-16651
information security
filesystem vulnerability
configuration files
webmail security

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

EPSS

0.015

Percentile

86.9%

Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host’s filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.

Affected configurations

Nvd
Node
roundcubewebmailRange1.1.9
OR
roundcubewebmailMatch1.2.0
OR
roundcubewebmailMatch1.2.1
OR
roundcubewebmailMatch1.2.2
OR
roundcubewebmailMatch1.2.3
OR
roundcubewebmailMatch1.2.4
OR
roundcubewebmailMatch1.2.5
OR
roundcubewebmailMatch1.2.6
OR
roundcubewebmailMatch1.3.0
OR
roundcubewebmailMatch1.3.1
OR
roundcubewebmailMatch1.3.2
Node
debiandebian_linuxMatch7.0
OR
debiandebian_linuxMatch9.0
VendorProductVersionCPE
roundcubewebmail1.2.6cpe:/a:roundcube:webmail:1.2.6:::
roundcubewebmail1.2.2cpe:/a:roundcube:webmail:1.2.2:::
roundcubewebmail1.2.0cpe:/a:roundcube:webmail:1.2.0:::
roundcubewebmail1.2.4cpe:/a:roundcube:webmail:1.2.4:::
roundcubewebmail1.3.1cpe:/a:roundcube:webmail:1.3.1:::
roundcubewebmail1.3.0cpe:/a:roundcube:webmail:1.3.0:::
roundcubewebmail1.3.2cpe:/a:roundcube:webmail:1.3.2:::
roundcubewebmail1.2.5cpe:/a:roundcube:webmail:1.2.5:::
roundcubewebmailcpe:/a:roundcube:webmail::::
roundcubewebmail1.2.1cpe:/a:roundcube:webmail:1.2.1:::
Rows per page:
1-10 of 111

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

High

EPSS

0.015

Percentile

86.9%