Roundcube Webmail before 1.4.4 allows attackers to include local files and execute code via directory traversal in a plugin name to rcubepluginapi.php.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "15.0-sp1"
}
]
},
{
"cpe": "cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "15.0-sp2"
}
]
},
{
"cpe": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "15.1"
}
]
},
{
"cpe": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "15.2"
}
]
}
]
}{
"cpe": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"source": [
"CPE_FIELD",
"REFERENCES"
],
"extracted_events": [
{
"introduced": "1.2.0"
},
{
"fixed": "1.2.10"
},
{
"introduced": "1.3.0"
},
{
"fixed": "1.3.11"
},
{
"introduced": "1.4.0"
},
{
"fixed": "1.4.4"
}
]
}