-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
File Disclosure Vulnerability #6026
Comments
You can send it to alec at alec.pl, can be encrypted with pgp key: 19359DC1. The address you mentioned would work too, but it might be faster to deal with it if you send the details to me. Thanks. |
I sent the details to alec at alec.pl. Thanks. |
Thank you. I confirm the exploit works on every version since 1.1-beta. |
We're testing now a proper patch for this issue. The fix will be pushed tomorrow and the new releases should be available soon after that. |
…ion in relation with attachment plugins (#6026)
…ion in relation with attachment plugins (#6026)
…ion in relation with attachment plugins (#6026)
…ion in relation with attachment plugins (#6026)
…ion in relation with attachment plugins (#6026)
Fixed in all release branches up to 1.0. |
CVE-2017-16651 - details will be published after release. |
@alecpl @thomascube I am in the process of backporting the fix to version 0.7.2 (in Debian Wheezy). Since the code is somewhat different between the 1.x patches that are listed here in this issue, I would like to know the best to proceed. Would I be able to obtain the details of the exploit in order to reproduce the issue and validate my patch? Or would it be better for me to post my patch here or on the -dev mailing list for your comment? |
But why would you do this for 5-years old code? The most important part of the patch is in rcmail.php, it fixes the discovered vulnerability. Other changes are to fix yet unknown attack vectors. |
I am working on backporting this because I support the Debian LTS
project: https://wiki.debian.org/LTS
Debian Wheezy (which shipped roundcube 0.7.2) is supported until 31st
May 2018. If the patch were too intrusive, it is possible we would have
not attempted to fix this by backporting the patch. However, I believe
that I have correctly adapted the patch and I would like to either try
to replicate the issue or have an upstream developer review it to
confirm that I have properly adapted it.
Even if I can reproduce the exploit and then confirm for myself that I
have adapted the patch properly, I would feel better about having it
reviewed by an upstream developer. Should I post the patch here for
review?
|
Actually there's no way to reproduce the issue on 0.7, because program/steps/settings/upload.inc file does not exist there. So, 0.7 is not vulnerable. You should still probably apply the patch to prevent from yet unknown vulnerabilities, but there's no known way to test the vulnerability on 0.7. |
That is good to know. Would you be willing to review this patch to see
if the way I adapted makes sense?
|
Attaching it did not work. Perhaps this is better:
|
@alecpl Have you been able to review my patch? I would like to make an
upload and close this issue in Debian Wheezy, unless it would be better
to skip the patch altogether and simply mark it as not affecting
roundcube 0.7.2. Please advise.
|
Looks good, but in the last part you should not remove floatval() use. Also you should test if sending mail with attachments works with the patch, to make sure it did not break anything. |
Thanks! I appreciate the feedback. I will make the recommended
adjustments to the patch, test the changes, and prepare an updated
package for Debian.
|
@rcsanchez97 just FYI, backporting this fix into 0.7.2 broke working with attachments completely. Specifically in my case, it was caused by missing I am running Roundcube 0.7.2 and the It took me some time to figure out that this is the problem, hope that someone will find this comment in case they face the same issue. |
Thanks for the info. Debian wheezy LTS ended a few months ago and this
version of roundcube is no longer in a supported Debian release. I am
glad that you discovered a workaround and documented it here, as there
will not be an update to correct this.
|
Yeah, I know the support has ended, I just wanted to mention it for someone else who may face the problem. For the record, the folder that I had to create was I just remembered that long time ago I have upgraded this Debian box from squeeze to wheezy, where I was also using roundcube. So maybe this problem is related to upgrade from older release(s) of Debian. |
There is a zero-day file disclosure vulnerability in the latest version of roundcube webmail which currently is being exploited by hackers to read roundcube's configuration files and steal its database credentials. It requires a valid username/password to login to a roundcube installation.
I don't know how exactly should I report the details of this bug. Is there a proper way to privately send the details to roundcube's developers? Can I send the details to hello(at)roundcube(dot)net?
The text was updated successfully, but these errors were encountered: