CVE-2020-12641

Published May 4, 2020

Last updated 3 years ago

Overview

Description
rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
Source
cve@mitre.org
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

CVSS 2.0

Type
Primary
Base score
7.5
Impact score
6.4
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:P/I:P/A:P

Known exploits

Data from CISA

Vulnerability name
Roundcube Webmail Remote Code Execution Vulnerability
Exploit added on
Jun 22, 2023
Exploit action due
Jul 13, 2023
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-78

Social media

Hype score
Not currently trending

Configurations