vendor:
RoundCube Webmail
by:
Jacobo Avariento Gimeno (Sofistic)
N/A
CVSS
N/A
Remote Code Execution
94
CWE
Product Name: RoundCube Webmail
Affected Version From: Round Cube RoundCube Webmail 0.2-3 beta
Affected Version To: Round Cube RoundCube Webmail 0.2-1 alpha
Patch Exists: YES
Related CWE: CVE-2008-5619
CPE: a:roundcube:roundcube_webmail
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2008
RoundCube Webmail 0.2-3 beta and 0.2-1 alpha Remote Code Execution Vulnerability
RoundCube Webmail is a browser-based IMAP client that uses 'chuggnutt.com HTML to Plain Text Conversion' library to convert HTML text to plain text, this library uses the preg_replace PHP function in an insecure manner. This vulnerability allows an attacker to execute arbitrary shell commands using PHP curly syntax plus some tricks to bypass PHP magic_quotes_gpc to avoid using single or double quotes.
Mitigation:
Upgrade to the latest version of RoundCube Webmail.