CVE-2020-12641
rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- May 04, 2020
- Published Date
- May 04, 2020
- Last Updated
- February 04, 2025
- Vendor
- n/a
- Product
- n/a
- Description
- rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
CVSS Scores
CVSS v3.1
9.8 - CRITICAL
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
SSVC Information
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
References
https://github.com/roundcube/roundcubemail/releases/tag/1.4.4
https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4
https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10
https://github.com/roundcube/roundcubemail/commit/fcfb099477f353373c34c8a65c9035b06b364db3
https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2020-12641-Command%20Injection-Roundcube
https://security.gentoo.org/glsa/202007-41
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00083.html
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2023-06-22 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
mbadanoiu/CVE-2020-12641
Type: github • Created: 2024-04-08 19:48:16 UTC • Stars: 0
CVE-2020-12641: Command Injection via “_im_convert_path” Parameter in Roundcube Webmail