Vulnerability Description
Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Roundcube | Webmail | <= 1.1.9 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/161226/Roundcube-Webmail-1.2-File-DisclosurExploitThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/101793Third Party AdvisoryVDB Entry
- https://github.com/roundcube/roundcubemail/issues/6026Issue TrackingPatchThird Party Advisory
- https://github.com/roundcube/roundcubemail/releases/tag/1.1.10Issue TrackingRelease NotesThird Party Advisory
- https://github.com/roundcube/roundcubemail/releases/tag/1.2.7Issue TrackingRelease NotesThird Party Advisory
- https://github.com/roundcube/roundcubemail/releases/tag/1.3.3Issue TrackingRelease NotesThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2017/11/msg00039.htmlMailing ListThird Party Advisory
- https://roundcube.net/news/2017/11/08/security-updates-1.3.3-1.2.7-and-1.1.10Issue TrackingVendor Advisory
- https://www.debian.org/security/2017/dsa-4030Issue TrackingThird Party Advisory
- http://packetstormsecurity.com/files/161226/Roundcube-Webmail-1.2-File-DisclosurExploitThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/101793Third Party AdvisoryVDB Entry
- https://github.com/roundcube/roundcubemail/issues/6026Issue TrackingPatchThird Party Advisory
- https://github.com/roundcube/roundcubemail/releases/tag/1.1.10Issue TrackingRelease NotesThird Party Advisory
- https://github.com/roundcube/roundcubemail/releases/tag/1.2.7Issue TrackingRelease NotesThird Party Advisory
- https://github.com/roundcube/roundcubemail/releases/tag/1.3.3Issue TrackingRelease NotesThird Party Advisory
FAQ
What is CVE-2017-16651?
CVE-2017-16651 is a vulnerability with a CVSS score of 7.8 (HIGH). Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the w...
How severe is CVE-2017-16651?
CVE-2017-16651 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-16651?
Check the references section above for vendor advisories and patch information. Affected products include: Roundcube Webmail, Debian Debian Linux.