CVE-2017-16651

HIGH KEV

Roundcube Webmail <1.1.10, 1.2.x <1.2.7, 1.3.x <1.3.3 - Arbitrary File Access

Title source: llm

Description

Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.

Exploits (2)

nomisec WORKING POC 3 stars
by ropbear · local
https://github.com/ropbear/CVE-2017-16651
metasploit WORKING POC
by joel @ ndepthsecurity, stonepresto, thomascube · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/roundcube_auth_file_read.rb

Scores

CVSS v3 7.8
EPSS 0.3727
EPSS Percentile 97.2%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2021-11-03
VulnCheck KEV 2017-11-08
InTheWild.io 2021-03-04
ENISA EUVD EUVD-2017-7838
CWE
CWE-552
Status published
Products (13)
debian/debian_linux 7.0
debian/debian_linux 9.0
roundcube/webmail 1.2.0
roundcube/webmail 1.2.1
roundcube/webmail 1.2.2
roundcube/webmail 1.2.3
roundcube/webmail 1.2.4
roundcube/webmail 1.2.5
roundcube/webmail 1.2.6
roundcube/webmail 1.3.0
... and 3 more
Published Nov 09, 2017
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026