Vulnerability Details CVE-2018-9846
In Roundcube from versions 1.2.0 to 1.3.5, with the archive plugin enabled and configured, it's possible to exploit the unsanitized, user-controlled "_uid" parameter (in an archive.php _task=mail&_mbox=INBOX&_action=plugin.move2archive request) to perform an MX (IMAP) injection attack by placing an IMAP command after a %0d%0a sequence. NOTE: this is less easily exploitable in 1.3.4 and later because of a Same Origin Policy protection mechanism.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 62.6%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 6.8
Products affected by CVE-2018-9846
-
cpe:2.3:a:roundcube:webmail:1.2.0
-
cpe:2.3:a:roundcube:webmail:1.2.1
-
cpe:2.3:a:roundcube:webmail:1.2.10
-
cpe:2.3:a:roundcube:webmail:1.2.11
-
cpe:2.3:a:roundcube:webmail:1.2.12
-
cpe:2.3:a:roundcube:webmail:1.2.13
-
cpe:2.3:a:roundcube:webmail:1.2.2
-
cpe:2.3:a:roundcube:webmail:1.2.3
-
cpe:2.3:a:roundcube:webmail:1.2.4
-
cpe:2.3:a:roundcube:webmail:1.2.5
-
cpe:2.3:a:roundcube:webmail:1.2.6
-
cpe:2.3:a:roundcube:webmail:1.2.7
-
cpe:2.3:a:roundcube:webmail:1.2.8
-
cpe:2.3:a:roundcube:webmail:1.2.9
-
cpe:2.3:a:roundcube:webmail:1.3
-
cpe:2.3:a:roundcube:webmail:1.3.0
-
cpe:2.3:a:roundcube:webmail:1.3.1
-
cpe:2.3:a:roundcube:webmail:1.3.2
-
cpe:2.3:a:roundcube:webmail:1.3.3
-
cpe:2.3:a:roundcube:webmail:1.3.4
-
cpe:2.3:a:roundcube:webmail:1.3.5
-
cpe:2.3:o:debian:debian_linux:9.0