CVE-2020-12640Path Traversal in Webmail

CWE-22Path Traversal9 documents7 sources
Severity
9.8CRITICALNVD
EPSS
22.7%
top 4.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 4
Latest updateAug 8

Description

Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcube_plugin_api.php.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDroundcube/webmail1.2.01.2.10+2
NVDopensuse/leap15.1, 15.2+1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-j63m-cchh-gcjv: Roundcube Webmail before 12022-05-24
CVEList
CVE-2020-12640: Roundcube Webmail before 12020-05-04
OSV
CVE-2020-12640: Roundcube Webmail before 12020-05-04

📋Vendor Advisories

2
Ubuntu
Roundcube Webmail vulnerabilities2022-08-08
Debian
CVE-2020-12640: roundcube - Roundcube Webmail before 1.4.4 allows attackers to include local files and execu...2020

💬Community

3
Bugzilla
CVE-2020-12640 roundcubemail: local file inclusion and code execution via crafted plugins option [fedora-all]2020-05-08
Bugzilla
CVE-2020-12640 roundcubemail: local file inclusion and code execution via crafted plugins option [epel-all]2020-05-08
Bugzilla
CVE-2020-12640 roundcubemail: local file inclusion and code execution via crafted plugins option2020-05-08
CVE-2020-12640 — Path Traversal in Roundcube Webmail | cvebase