You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
CVE-2013-6172. steps/utils/save_pref.inc in Roundcube webmail before 0.8.7 and 0.9.x before 0.9.5 allows remote attackers to modify configuration settings via the _session parameter, which can be leveraged to read arbitrary files, conduct SQL injection attacks, and execute arbitrary code.
Help me! find function contain vulnerbility "read arbitrary files" ?.
Thank you.
Reported by @alecpl on 17 Oct 2013 08:14 UTC as Trac ticket #1489382
It is possible to overwrite any variable in $_SESSION. This gives an attacker a lot of possibilities.
Migrated-From: http://trac.roundcube.net/ticket/1489382
The text was updated successfully, but these errors were encountered: