CVE-2013-6172 — SQL Injection in Webmail
Severity
7.5HIGHNVD
EPSS
1.1%
top 21.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 5
Latest updateMay 17
Description
steps/utils/save_pref.inc in Roundcube webmail before 0.8.7 and 0.9.x before 0.9.5 allows remote attackers to modify configuration settings via the _session parameter, which can be leveraged to read arbitrary files, conduct SQL injection attacks, and execute arbitrary code.
CVSS vector
AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4
Affected Packages1 packages
Patches
🔴Vulnerability Details
3📋Vendor Advisories
1Debian▶
CVE-2013-6172: roundcube - steps/utils/save_pref.inc in Roundcube webmail before 0.8.7 and 0.9.x before 0.9...↗2013
💬Community
3Bugzilla▶
CVE-2013-6172 roundcubemail: vulnerability in handling _session argument of utils/save-prefs↗2013-10-22
Bugzilla▶
CVE-2013-6172 roundcubemail: vulnerability in handling _session argument of utils/save-prefs [epel-all]↗2013-10-22
Bugzilla▶
CVE-2013-6172: Vulnerability in handling _session argument of utils/save-prefs [fedora-all]↗2013-10-22