Security restrictions bypass in roundcubemail (Alpine package)



Published: 2017-04-28
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-8114
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
roundcubemail (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU7478

Risk: Low

CVSSv3.1: 5.5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-8114

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote authenticated attacker to bypass security restrictions.

The weakness exists due to improper restriction of exec call in the virtualmin and sasl drivers of the password plugin. A remote attcker can arbitrarily reset passwords, bypass security restrictions and gain elevated privileges on the system.

Successful exploitation of the vulnerability results in privilege escalation.

Mitigation

Install update from vendor's website.

Vulnerable software versions

roundcubemail (Alpine package): 0.2.2-r0 - 1.1.8-r0

External links

http://git.alpinelinux.org/aports/commit/?id=30717c64a46cb821a2188235da2f567b2a9711e9
http://git.alpinelinux.org/aports/commit/?id=59fc0fee613036d25668302ec9e4a9316ffbc689
http://git.alpinelinux.org/aports/commit/?id=1a9cc81e9c0c47e5dd3d735dead6c6184f86ab3b
http://git.alpinelinux.org/aports/commit/?id=de51ff3dc809fd14f9e6d0780c79ab0ebd1f95d0
http://git.alpinelinux.org/aports/commit/?id=eb06a024e1fd450d0e1cf820e7a6f1940c7aff77


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###