Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 on Windows allows command injection via im_convert_path and im_identify_path. NOTE: this issue exists because of an incomplete fix for CVE-2020-12641.
References
Configurations
Configuration 1 (hide)
|
History
01 May 2025, 19:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/roundcube/roundcubemail/commit/5ea9f37ce39374b6124586c0590fec7015d35d7f - Patch | |
References | () https://github.com/roundcube/roundcubemail/releases/tag/1.5.7 - Release Notes | |
References | () https://github.com/roundcube/roundcubemail/releases/tag/1.6.7 - Release Notes | |
CPE | cpe:2.3:a:roundcube:webmail:*:*:*:*:*:windows:*:* | |
First Time |
Roundcube webmail
Roundcube |
Information
Published : 2024-06-07 04:15
Updated : 2025-05-01 19:49
NVD link : CVE-2024-37385
Mitre link : CVE-2024-37385
CVE.ORG link : CVE-2024-37385
JSON object : View
Products Affected
roundcube
- webmail
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')