Summary
It was discovered that roundcube, a skinnable AJAX based webmail solution for IMAP servers, does not properly sanitize the _session parameter in steps/utils/save_pref.inc during saving preferences. The vulnerability can be exploited to overwrite configuration settings and subsequently allowing random file access, manipulated SQL queries and even code execution.
roundcube in the oldstable distribution (squeeze) is not affected by this problem.
Solution
For the stable distribution (wheezy), this problem has been fixed in version 0.7.2-9+deb7u1.
For the unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your roundcube packages.
Insight
RoundCube Webmail is a browser-based multilingual IMAP client with an application-like user interface. It provides full functionality expected from an e-mail client, including MIME support, address book, folder manipulation and message filters.
Affected
roundcube on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-6172 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities