Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2016-9920

Опубликовано: 08 дек. 2016
Источник: nvd
CVSS3: 7.5
CVSS2: 6
EPSS Средний

Описание

steps/mail/sendmail.inc in Roundcube before 1.1.7 and 1.2.x before 1.2.3, when no SMTP server is configured and the sendmail program is enabled, does not properly restrict the use of custom envelope-from addresses on the sendmail command line, which allows remote authenticated users to execute arbitrary code via a modified HTTP request that sends a crafted e-mail message.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*
Версия до 1.1.6 (включая)
cpe:2.3:a:roundcube:webmail:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:1.2.2:*:*:*:*:*:*:*

EPSS

Процентиль: 97%
0.44834
Средний

7.5 High

CVSS3

6 Medium

CVSS2

Дефекты

CWE-284

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 9 лет назад

steps/mail/sendmail.inc in Roundcube before 1.1.7 and 1.2.x before 1.2.3, when no SMTP server is configured and the sendmail program is enabled, does not properly restrict the use of custom envelope-from addresses on the sendmail command line, which allows remote authenticated users to execute arbitrary code via a modified HTTP request that sends a crafted e-mail message.

CVSS3: 7.5
debian
около 9 лет назад

steps/mail/sendmail.inc in Roundcube before 1.1.7 and 1.2.x before 1.2 ...

CVSS3: 7.5
github
больше 3 лет назад

steps/mail/sendmail.inc in Roundcube before 1.1.7 and 1.2.x before 1.2.3, when no SMTP server is configured and the sendmail program is enabled, does not properly restrict the use of custom envelope-from addresses on the sendmail command line, which allows remote authenticated users to execute arbitrary code via a modified HTTP request that sends a crafted e-mail message.

EPSS

Процентиль: 97%
0.44834
Средний

7.5 High

CVSS3

6 Medium

CVSS2

Дефекты

CWE-284