Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1000071

Опубликовано: 13 мар. 2018
Источник: debian
EPSS Низкий

Описание

roundcube version 1.3.4 and earlier contains an Insecure Permissions vulnerability in enigma plugin that can result in exfiltration of gpg private key. This attack appear to be exploitable via network connectivity.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
roundcubefixed1.3.10+dfsg.1-1package
roundcubefixed1.3.10+dfsg.1-1~deb10u1busterpackage
roundcubefixed1.2.3+dfsg.1-4+deb9u2stretchpackage

Примечания

  • https://github.com/roundcube/roundcubemail/issues/6173

  • https://github.com/roundcube/roundcubemail/commit/48417c5fc9f6eb4b90500c09596606d489c700b5

  • https://www.legacysecuritygroup.com/cve/references/02122018-roundcube-enigma.txt

  • That plugin is not functional in stretch due to a missing package dependency, setting it

  • up would require several additional manual changes on the admin's side

  • Can be mitigated by moving home folder outside the scope of the webserver

EPSS

Процентиль: 52%
0.00291
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 8 лет назад

roundcube version 1.3.4 and earlier contains an Insecure Permissions vulnerability in enigma plugin that can result in exfiltration of gpg private key. This attack appear to be exploitable via network connectivity.

CVSS3: 7.5
nvd
почти 8 лет назад

roundcube version 1.3.4 and earlier contains an Insecure Permissions vulnerability in enigma plugin that can result in exfiltration of gpg private key. This attack appear to be exploitable via network connectivity.

CVSS3: 7.5
github
больше 3 лет назад

roundcube version 1.3.4 and earlier contains an Insecure Permissions vulnerability in enigma plugin that can result in exfiltration of gpg private key. This attack appear to be exploitable via network connectivity.

EPSS

Процентиль: 52%
0.00291
Низкий