CVE-2024-37385

Source
https://cve.org/CVERecord?id=CVE-2024-37385
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-37385.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-37385
Published
2024-06-07T04:15:30.720Z
Modified
2026-02-03T07:37:01.305799Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 on Windows allows command injection via imconvertpath and imidentifypath. NOTE: this issue exists because of an incomplete fix for CVE-2020-12641.

References

Affected packages

Git / github.com/roundcube/roundcubemail

Affected versions

1.*
1.6.0
1.6.1
1.6.2
1.6.3
1.6.4
1.6.5
1.6.6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-37385.json"