Bug ID | 1171149 |
---|---|
Summary | VUL-0: CVE-2020-12640: roundcubemail: directory traversal and local file inclusion in rcube_plugin_api.php |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.1 |
Hardware | Other |
URL | https://smash.suse.de/issue/259021/ |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Security |
Assignee | security-team@suse.de |
Reporter | atoptsoglou@suse.com |
QA Contact | security-team@suse.de |
Found By | Security Response Team |
Blocker | --- |
CVE-2020-12640 Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcube_plugin_api.php. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-12640 https://github.com/roundcube/roundcubemail/releases/tag/1.4.4 https://github.com/roundcube/roundcubemail/compare/1.4.3...1.4.4 https://github.com/roundcube/roundcubemail/commit/814eadb699e8576ce3a78f21e95bf69a7c7b3794 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12640 https://roundcube.net/news/2020/04/29/security-updates-1.4.4-1.3.11-and-1.2.10