Roundcube Webmail 1.1.x before 1.1.2 allows remote attackers to obtain sensitive information by reading files in the (1) config, (2) temp, or (3) logs directory.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2015/07/07/2 | Mailing List Patch Third Party Advisory |
https://github.com/roundcube/roundcubemail/commit/012555c1cef35601b543cde67bff8726de97eb39 | Issue Tracking Patch Third Party Advisory |
https://github.com/roundcube/roundcubemail/issues/4816 | Issue Tracking Patch Third Party Advisory |
https://roundcube.net/news/2015/06/05/updates-1.1.2-and-1.0.6-released | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-05-23 04:29
Updated : 2024-02-28 15:44
NVD link : CVE-2015-5383
Mitre link : CVE-2015-5383
CVE.ORG link : CVE-2015-5383
JSON object : View
Products Affected
roundcube
- webmail
- roundcube_webmail
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor