{"id":"MGASA-2013-0325","summary":"Updated roundcubemail package fixes security vulnerability","details":"It was discovered that roundcube does not properly sanitize the\n_session parameter in steps/utils/save_pref.inc during saving\npreferences. The vulnerability can be exploited to overwrite\nconfiguration settings and subsequently allowing random file access,\nmanipulated SQL queries and even code execution (CVE-2013-6172).\n","modified":"2026-01-31T01:16:47.589445Z","published":"2013-11-18T14:35:57Z","related":["CVE-2013-6172"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2013-0325.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=11552"},{"type":"REPORT","url":"http://roundcube.net/news/2013/10/21/security-updates-095-and-087/"},{"type":"REPORT","url":"http://www.debian.org/security/2013/dsa-2787"},{"type":"REPORT","url":"http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2013:263/"}],"affected":[{"package":{"name":"roundcubemail","ecosystem":"Mageia:2","purl":"pkg:rpm/mageia/roundcubemail?arch=source&distro=mageia-2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.7.4-1.3.mga2"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0325.json"}},{"package":{"name":"roundcubemail","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/roundcubemail?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.5-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0325.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}