CVE-2017-16651
HIGH KEVRoundcube Webmail <1.1.10, 1.2.x <1.2.7, 1.3.x <1.3.3 - Arbitrary File Access
Title source: llmDescription
Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.
Exploits (2)
metasploit
WORKING POC
by joel @ ndepthsecurity, stonepresto, thomascube · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/roundcube_auth_file_read.rb
Scores
CVSS v3
7.8
EPSS
0.3727
EPSS Percentile
97.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2021-11-03
VulnCheck KEV
2017-11-08
InTheWild.io
2021-03-04
ENISA EUVD
EUVD-2017-7838
CWE
CWE-552
Status
published
Products (13)
debian/debian_linux
7.0
debian/debian_linux
9.0
roundcube/webmail
1.2.0
roundcube/webmail
1.2.1
roundcube/webmail
1.2.2
roundcube/webmail
1.2.3
roundcube/webmail
1.2.4
roundcube/webmail
1.2.5
roundcube/webmail
1.2.6
roundcube/webmail
1.3.0
... and 3 more
Published
Nov 09, 2017
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026