Arbitrary Code Injection Affecting roundcube package, versions <0.1.1-9


Severity

Recommended
high

Based on Debian security rating.

Threat Intelligence

Exploit Maturity
Mature
EPSS
68.77% (99th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-ROUNDCUBE-515159
  • published17 Dec 2008
  • disclosed17 Dec 2008

Introduced: 17 Dec 2008

CVE-2008-5619  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade Debian:11 roundcube to version 0.1.1-9 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream roundcube package and not the roundcube package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMailer before 5.2.10, RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03, allows remote attackers to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch.

CVSS Scores

version 3.1