Vulnerabilities
Vulnerable Software
Roundcube:  >> Webmail  >> 1.2.11  Security Vulnerabilities
In Roundcube from versions 1.2.0 to 1.3.5, with the archive plugin enabled and configured, it's possible to exploit the unsanitized, user-controlled "_uid" parameter (in an archive.php _task=mail&_mbox=INBOX&_action=plugin.move2archive request) to perform an MX (IMAP) injection attack by placing an IMAP command after a %0d%0a sequence. NOTE: this is less easily exploitable in 1.3.4 and later because of a Same Origin Policy protection mechanism.
CVSS Score
8.8
EPSS Score
0.005
Published
2018-04-07
roundcube version 1.3.4 and earlier contains an Insecure Permissions vulnerability in enigma plugin that can result in exfiltration of gpg private key. This attack appear to be exploitable via network connectivity.
CVSS Score
7.5
EPSS Score
0.003
Published
2018-03-13


Contact Us

Shodan ® - All rights reserved