Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-1904

Опубликовано: 08 фев. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

Absolute path traversal vulnerability in steps/mail/sendmail.inc in Roundcube Webmail before 0.7.3 and 0.8.x before 0.8.6 allows remote attackers to read arbitrary files via a full pathname in the _value parameter for the generic_message_footer setting in a save-perf action to index.php, as exploited in the wild in March 2013.

РелизСтатусПримечание
devel

not-affected

0.7.2-9
esm-apps/xenial

not-affected

0.7.2-9
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [0.7.2-9]]
hardy

ignored

end of life
lucid

ignored

end of life
oneiric

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

ignored

end of life
raring

not-affected

0.7.2-9

Показывать по

Ссылки на источники

EPSS

Процентиль: 56%
0.0034
Низкий

5 Medium

CVSS2

Связанные уязвимости

nvd
почти 12 лет назад

Absolute path traversal vulnerability in steps/mail/sendmail.inc in Roundcube Webmail before 0.7.3 and 0.8.x before 0.8.6 allows remote attackers to read arbitrary files via a full pathname in the _value parameter for the generic_message_footer setting in a save-perf action to index.php, as exploited in the wild in March 2013.

debian
почти 12 лет назад

Absolute path traversal vulnerability in steps/mail/sendmail.inc in Ro ...

github
больше 3 лет назад

Absolute path traversal vulnerability in steps/mail/sendmail.inc in Roundcube Webmail before 0.7.3 and 0.8.x before 0.8.6 allows remote attackers to read arbitrary files via a full pathname in the _value parameter for the generic_message_footer setting in a save-perf action to index.php, as exploited in the wild in March 2013.

EPSS

Процентиль: 56%
0.0034
Низкий

5 Medium

CVSS2