Bug 1089461 - (CVE-2018-9846) VUL-1: CVE-2018-9846: roundcubemail: MX injection in archive.php
(CVE-2018-9846)
VUL-1: CVE-2018-9846: roundcubemail: MX injection in archive.php
Status: RESOLVED FIXED
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Security
Leap 42.3
Other Other
: P4 - Low : Normal (vote)
: ---
Assigned To: Peter Nixon
Security Team bot
https://smash.suse.de/issue/203296/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-04-13 05:15 UTC by Karol Babioch
Modified: 2019-07-04 05:57 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Karol Babioch 2018-04-13 05:15:46 UTC
In Roundcube from versions 1.2.0 to 1.3.5, with the archive plugin enabled and
configured, it's possible to exploit the unsanitized, user-controlled "_uid"
parameter (in an archive.php _task=mail&_mbox=INBOX&_action=plugin.move2archive
request) to perform an MX (IMAP) injection attack by placing an IMAP command
after a %0d%0a sequence. NOTE: this is less easily exploitable in 1.3.4 and
later because of a Same Origin Policy protection mechanism.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1566743
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-9846
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-9846.html
http://www.cvedetails.com/cve/CVE-2018-9846/
https://github.com/roundcube/roundcubemail/issues/6238
https://medium.com/@ndrbasi/cve-2018-9846-roundcube-303097048b0a
https://github.com/roundcube/roundcubemail/issues/6229
Comment 1 Marcus Meissner 2019-07-04 05:57:45 UTC
42.3 is eol, 15.0 has 1.3.6... is resolved