CVE-2020-12641

rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting...

Basic Information

CVE State
PUBLISHED
Reserved Date
May 04, 2020
Published Date
May 04, 2020
Last Updated
February 04, 2025
Vendor
n/a
Product
n/a
Description
rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2023-06-22 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2024-04-08 19:48:16 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2023-06-22 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

mbadanoiu/CVE-2020-12641

Type: github • Created: 2024-04-08 19:48:16 UTC • Stars: 0

CVE-2020-12641: Command Injection via “_im_convert_path” Parameter in Roundcube Webmail