Upstream information

CVE-2013-6172 at MITRE


steps/utils/ in Roundcube webmail before 0.8.7 and 0.9.x before 0.9.5 allows remote attackers to modify configuration settings via the _session parameter, which can be leveraged to read arbitrary files, conduct SQL injection attacks, and execute arbitrary code.

SUSE information

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.48
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 847179 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 12.3
  • php5-pear-Net_IDNA2 >= 0.1.1-5.1
  • roundcubemail >= 0.9.5-1.18.1
openSUSE 13.1
  • php5-pear-Net_IDNA2 >= 0.1.1-5.1
  • roundcubemail >= 0.9.5-2.10.1