[Pkg-roundcube-maintainers] Bug#895184: roundcube: CVE-2018-9846: check_request() bypass in archive plugin
carnil at debian.org
Fri Apr 20 04:18:36 BST 2018
Thanks for following up for stretch. First a quick comment. Please
always CC team at security.debian.org on such questions for if an update
is wanted for DSA. This alows team members to better share the load
for review, release, etc ... (and it's recorded futhermore on the team
On Wed, Apr 18, 2018 at 09:27:36PM +0200, Guilhem Moulin wrote:
> Hi Salvatore,
> On Sun, 08 Apr 2018 at 10:27:10 +0200, Salvatore Bonaccorso wrote:
> > The following vulnerability was published for roundcube.
> > CVE-2018-9846:
> > | In Roundcube from versions 1.2.0 to 1.3.5, with the archive plugin
> > | enabled and configured, it's possible to exploit the unsanitized,
> > | user-controlled "_uid" parameter (in an archive.php
> > | _task=mail&_mbox=INBOX&_action=plugin.move2archive request) to perform
> > | an MX (IMAP) injection attack by placing an IMAP command after a %0d%0a
> > | sequence. NOTE: this is less easily exploitable in 1.3.4 and later
> > | because of a Same Origin Policy protection mechanism.
> > If you fix the vulnerability please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 1.2.8 was released yesterday. Attached is a debdiff with the following
> upstream commits cherry-picked (ignoring changes to CHANGELOG):
> Should we go via stretch-security, or aim for the next stable point
I think we should release this through stretch-security. The debdiff
per se looks already good. Were you able to test the update in
production under stretch?
There is though one no-dsa issue,
would be good to be included. Could you backport that fix as well and
send a new debdiff for quick review+ack for upload?
More information about the Pkg-roundcube-maintainers