Directory traversal vulnerability in the setskin function in program/include/rcmailoutput_html.php in Roundcube before 1.0.8 and 1.1.x before 1.1.4 allows remote authenticated users with certain permissions to read arbitrary files or possibly execute arbitrary code via a .. (dot dot) in the _skin parameter to index.php.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "roundcube", "binary_version": "1.1.4+dfsg.1-1" }, { "binary_name": "roundcube-core", "binary_version": "1.1.4+dfsg.1-1" }, { "binary_name": "roundcube-mysql", "binary_version": "1.1.4+dfsg.1-1" }, { "binary_name": "roundcube-pgsql", "binary_version": "1.1.4+dfsg.1-1" }, { "binary_name": "roundcube-plugins", "binary_version": "1.1.4+dfsg.1-1" }, { "binary_name": "roundcube-sqlite3", "binary_version": "1.1.4+dfsg.1-1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "roundcube", "binary_version": "1.3.6+dfsg.1-1" }, { "binary_name": "roundcube-core", "binary_version": "1.3.6+dfsg.1-1" }, { "binary_name": "roundcube-mysql", "binary_version": "1.3.6+dfsg.1-1" }, { "binary_name": "roundcube-pgsql", "binary_version": "1.3.6+dfsg.1-1" }, { "binary_name": "roundcube-plugins", "binary_version": "1.3.6+dfsg.1-1" }, { "binary_name": "roundcube-sqlite3", "binary_version": "1.3.6+dfsg.1-1" } ] }