CVE-2018-9846 - Input Validation vulnerability in Debian and Roundcube products

Publication

2018-04-07

Last modification

2018-05-24

Summary

In Roundcube from versions 1.2.0 to 1.3.5, with the archive plugin enabled and configured, it's possible to exploit the unsanitized, user-controlled "_uid" parameter (in an archive.php _task=mail&_mbox=INBOX&_action=plugin.move2archive request) to perform an MX (IMAP) injection attack by placing an IMAP command after a %0d%0a sequence. NOTE: this is less easily exploitable in 1.3.4 and later because of a Same Origin Policy protection mechanism.

Classification

CWE-20 - Input Validation

Risk level (CVSS AV:N/AC:M/Au:N/C:P/I:P/A:P)

Medium

6.8

Access Vector

  • Network
  • Adjacent Network
  • Local

Access Complexity

  • Low
  • Medium
  • High

Authentication

  • None
  • Single
  • Multiple

Confident. Impact

  • Complete
  • Partial
  • None

Integrity Impact

  • Complete
  • Partial
  • None

Affected Products

Vendor Product Versions
Debian Debian Linux  9.0
Roundcube Webmail  1.2.5 , 1.2.1 , 1.2.7 , 1.2.9 , 1.3.5 , 1.2.0 , 1.3.1 , 1.3.3 , 1.3.0 , 1.3.4 , 1.2.6 , 1.2.8 , 1.3.2 , 1.2.4 , 1.2.2 , 1.2.3