Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
In Roundcube from versions 1.2.0 to 1.3.5, with the archive plugin enabled and configured, it's possible to exploit the unsanitized, user-controlled "_uid" parameter (in an archive.php _task=mail&_mbox=INBOX&_action=plugin.move2archive request) to perform an MX (IMAP) injection attack by placing an IMAP command after a %0d%0a sequence. NOTE: this is less easily exploitable in 1.3.4 and later because of a Same Origin Policy protection mechanism.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Roundcube 输入验证漏洞
Vulnerability Description
Roundcube是一款基于浏览器的IMAP客户端(邮件客户端),它支持地址薄管理、信息搜索、拼写检查等。 Roundcube 1.2.0版本至1.3.5 版本中存在输入验证漏洞,该漏洞源于程序没有正确的过滤用户控制的参数。当归档插件被配置并启用时,远程攻击者可通过在%0d%0a序列后放置IMAP命令利用该漏洞注入任意的IMAP命令并执行恶意的操作。
CVSS Information
N/A
Vulnerability Type
N/A