CVE-2013-6172SQL Injection in Webmail

CWE-89SQL Injection8 documents6 sources
Severity
7.5HIGHNVD
EPSS
1.1%
top 21.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 5
Latest updateMay 17

Description

steps/utils/save_pref.inc in Roundcube webmail before 0.8.7 and 0.9.x before 0.9.5 allows remote attackers to modify configuration settings via the _session parameter, which can be leveraged to read arbitrary files, conduct SQL injection attacks, and execute arbitrary code.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages1 packages

NVDroundcube/webmail0.8.6+32

Patches

🔴Vulnerability Details

3
GHSA
GHSA-pq43-cvv2-h373: steps/utils/save_pref2022-05-17
CVEList
CVE-2013-6172: steps/utils/save_pref2013-11-05
OSV
CVE-2013-6172: steps/utils/save_pref2013-11-05

📋Vendor Advisories

1
Debian
CVE-2013-6172: roundcube - steps/utils/save_pref.inc in Roundcube webmail before 0.8.7 and 0.9.x before 0.9...2013

💬Community

3
Bugzilla
CVE-2013-6172 roundcubemail: vulnerability in handling _session argument of utils/save-prefs2013-10-22
Bugzilla
CVE-2013-6172 roundcubemail: vulnerability in handling _session argument of utils/save-prefs [epel-all]2013-10-22
Bugzilla
CVE-2013-6172: Vulnerability in handling _session argument of utils/save-prefs [fedora-all]2013-10-22
CVE-2013-6172 — SQL Injection in Roundcube Webmail | cvebase