rcubeimage.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for imconvertpath or imidentify_path.
{
"versions": [
{
"introduced": "1.2.0"
},
{
"fixed": "1.2.10"
},
{
"introduced": "1.3.0"
},
{
"fixed": "1.3.11"
},
{
"introduced": "1.4.0"
},
{
"fixed": "1.4.4"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-12641.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.0-sp1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.0-sp2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.2"
}
]
}
]