A local file inclusion flaw was found in the way Round Cube Webmail, a browser-based multilingual IMAP client, performed validation of the 'generic_message_footer' value provided via web user interface in certain circumstances. A remote attacker could issue a specially-crafted request that, when processed by Round Cube Webmail could allow an attacker to obtain arbitrary file on the system, accessible with the privileges of the user running Round Cube Webmail client. References: [1] http://sourceforge.net/news/?group_id=139281&id=310497 [2] http://lists.roundcube.net/pipermail/dev/2013-March/022328.html [3] https://bugs.gentoo.org/show_bug.cgi?id=463554 Upstream patches: [4] http://ow.ly/jtQD0 [5] http://ow.ly/jtQHM [6] http://ow.ly/jtQK0 [7] http://ow.ly/jtQNd
This issue affects the versions of the roundcubemail package, as shipped with Fedora release of 18, 17, and Fedora EPEL-6. Please schedule an update. -- This issue did NOT affect the version of the roundcubemail package, as shipped with Fedora EPEL-5, yet.
Created roundcubemail tracking bugs for this issue Affects: fedora-all [bug 928836] Affects: epel-6 [bug 928837]
CVE Request: http://www.openwall.com/lists/oss-security/2013/03/28/4
The CVE identifier of CVE-2013-1904 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2013/03/28/8