# N/A
## 漏洞概述
Roundcube Webmail存在远程代码执行漏洞,该漏洞允许经过身份验证的用户通过不验证URL中的_from参数来触发PHP对象反序列化。
## 影响版本
- Roundcube Webmail 1.5.10之前的版本
- Roundcube Webmail 1.6.x系列1.6.11之前的版本
## 漏洞细节
- 问题出现在`program/actions/settings/upload.php`脚本中。
- 漏洞根源在于参数`_from`没有被适当验证,导致了PHP对象反序列化的危险情况。
## 影响
该漏洞允许经过身份验证的攻击者通过构造恶意的URL参数执行任意代码,可能导致服务器被完全控制。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-49113.yaml | POC详情 |
2 | Detection for CVE-2025-49113 | https://github.com/rxerium/CVE-2025-49113 | POC详情 |
3 | CVE-2025-49113 - Roundcube <= 1.6.10 Post-Auth RCE via PHP Object Deserialization | https://github.com/Ademking/CVE-2025-49113-nuclei-template | POC详情 |
4 | None | https://github.com/fearsoff-org/CVE-2025-49113 | POC详情 |
5 | None | https://github.com/rasool13x/exploit-CVE-2025-49113 | POC详情 |
6 | CVE-2025-49113 exploit | https://github.com/SyFi/CVE-2025-49113 | POC详情 |
7 | Proof of Concept demonstrating Remote Code Execution through insecure deserialization in Roundcube (CVE-2025-49113). | https://github.com/hakaioffsec/CVE-2025-49113-exploit | POC详情 |
8 | Proof-of-concept to CVE-2025-49113 | https://github.com/BiiTts/Roundcube-CVE-2025-49113 | POC详情 |
9 | Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization. | https://github.com/Yuri08loveElaina/CVE-2025-49113 | POC详情 |
10 | CVE-2025-49113 | https://github.com/B1ack4sh/Blackash-CVE-2025-49113 | POC详情 |
11 | Explicação + Lab no THM | https://github.com/5kr1pt/Roundcube_CVE-2025-49113 | POC详情 |
12 | None | https://github.com/punitdarji/roundcube-cve-2025-49113 | POC详情 |
13 | A powerful Python scanner to detect CVE-2025-49113 vulnerability in Roundcube Webmail. Developed by Issam Junior (@issamiso). | https://github.com/issamjr/CVE-2025-49113-Scanner | POC详情 |
14 | None | https://github.com/hackmelocal/HML-CVE-2025-49113-Round-Cube | POC详情 |
15 | None | https://github.com/Joelp03/CVE-2025-49113 | POC详情 |
16 | None | https://github.com/hackmelocal/CVE-2025-49113-Simulation | POC详情 |
17 | 💥 Python Exploit for CVE-2025-49113 | Roundcube Webmail RCE via PHP Object Injection | https://github.com/00xCanelo/CVE-2025-49113 | POC详情 |
标题: Validate URL parameter in upload code by pabzm · Pull Request #9865 · roundcube/roundcubemail · GitHub -- 🔗来源链接
标签:
神龙速读标题: Validate URL parameter in upload code (#9866) · roundcube/roundcubemail@0376f69 · GitHub -- 🔗来源链接
标签:
神龙速读标题: Validate URL parameter in upload code (#9866) · roundcube/roundcubemail@7408f31 · GitHub -- 🔗来源链接
标签:
神龙速读暂无评论