It was discovered that Roundcube incorrectly handled certain file-based attachment plugins. An attacker could exploit this to gain unauthorized access to arbitrary files on the host’s file system.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm5", "binary_name": "roundcube" }, { "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm5", "binary_name": "roundcube-core" }, { "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm5", "binary_name": "roundcube-mysql" }, { "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm5", "binary_name": "roundcube-pgsql" }, { "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm5", "binary_name": "roundcube-plugins" }, { "binary_version": "1.2~beta+dfsg.1-0ubuntu1+esm5", "binary_name": "roundcube-sqlite3" } ] }