Roundcube Webmail - Command Injection

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

17 days 3 hours

Scan only one

URL

Toolbox

-

Roundcube Webmail before 1.4.4 contains a command injection caused by shell metacharacters in configuration settings for im_convert_path or im_identify_path, letting attackers execute arbitrary code, exploit requires attacker to control configuration settings.


References:

Remediation:
To remediate this vulnerability, update to Roundcube Webmail 1.4.5, 1.3.12 or later.
Get started to protecting your digital assets