Description
steps/utils/save_pref.inc in Roundcube webmail before 0.8.7 and 0.9.x before 0.9.5 allows remote attackers to modify configuration settings via the _session parameter, which can be leveraged to read arbitrary files, conduct SQL injection attacks, and execute arbitrary code.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2787-1 | roundcube security update |
EUVD |
EUVD-2013-6001 | steps/utils/save_pref.inc in Roundcube webmail before 0.8.7 and 0.9.x before 0.9.5 allows remote attackers to modify configuration settings via the _session parameter, which can be leveraged to read arbitrary files, conduct SQL injection attacks, and execute arbitrary code. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T17:29:42.979Z
Reserved: 2013-10-18T00:00:00.000Z
Link: CVE-2013-6172
No data.
Status : Deferred
Published: 2013-11-05T18:55:06.243
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-6172
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD