ID CVE-2017-16651
Summary Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.
References
Vulnerable Configurations
  • cpe:2.3:a:roundcube:webmail:0.1:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.1:-:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.1:-:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.1:20050811:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.1:20050811:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.1:20050820:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.1:20050820:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.1:20051007:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.1:20051007:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.1:20051021:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.1:20051021:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.1:alpha:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.1:alpha:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.1:beta:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.1:beta:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.1:beta2:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.1:beta2:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.1:rc1:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.1:rc2:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.1:rc2:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.1:stable:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.1:stable:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.2:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.2:-:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.2:-:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.2:alpha:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.2:alpha:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.2:beta:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.2:beta:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.2:stable:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.2:stable:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.3:-:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.3:-:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.3:beta:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.3:beta:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.3:rc1:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.3:rc1:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.3:stable:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.3:stable:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.4:-:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.4:-:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.4:beta:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.4:beta:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.5:-:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.5:-:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.5:beta:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.5:beta:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.5:rc:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.5:rc:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.6:-:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.6:-:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.6:beta:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.6:beta:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.6:rc:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.6:rc:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.7:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.7:-:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.7:-:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.7:beta1:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.7:beta1:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.7:beta2:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.7:beta2:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.8.0:-:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.8.0:-:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.8.0:beta:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.8.0:beta:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.8.0:rc:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.8.0:rc:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.9:beta:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.9:beta:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.9:rc:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.9:rc:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.9:rc2:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.9:rc2:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.9.0:-:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.9.0:-:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0:beta:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0:beta:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0:git:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0:git:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0:rc:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0:rc:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.1:-:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.1:-:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.1:beta:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.1:beta:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.1:rc:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.1:rc:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:roundcube:webmail:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:roundcube:webmail:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVSS
Base: 4.6 (as of 04-03-2021 - 21:08)
Impact:
Exploitability:
CWE CWE-552
CAPEC
  • Kerberoasting
    Through the exploitation of how service accounts leverage Kerberos authentication with Service Principal Names (SPNs), the adversary obtains and subsequently cracks the hashed credentials of a service account target to exploit its privileges. The Kerberos authentication protocol centers around a ticketing system which is used to request/grant access to services and to then access the requested services. As an authenticated user, the adversary may request Active Directory and obtain a service ticket with portions encrypted via RC4 with the private key of the authenticated account. By extracting the local ticket and saving it disk, the adversary can brute force the hashed value to reveal the target account credentials.
  • Probe System Files
    An adversary obtains unauthorized information due to improperly protected files. If an application stores sensitive information in a file that is not protected by proper access control, then an adversary can access the file and search for sensitive information.
  • Collect Data from Common Resource Locations
    An adversary exploits well-known locations for resources for the purposes of undermining the security of the target. In many, if not most systems, files and resources are organized in a default tree structure. This can be useful for adversaries because they often know where to look for resources or files that are necessary for attacks. Even when the precise location of a targeted resource may not be known, naming conventions may indicate a small area of the target machine's file tree where the resources are typically located. For example, configuration files are normally stored in the /etc director on Unix systems. Adversaries can take advantage of this to commit other types of attacks.
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 101793
confirm
debian DSA-4030
mlist [debian-lts-announce] 20171128 [SECURITY] [DLA 1193-1] roundcube security update
Last major update 04-03-2021 - 21:08
Published 09-11-2017 - 14:29
Last modified 04-03-2021 - 21:08
Back to Top