{"id":"UBUNTU-CVE-2013-6172","details":"steps/utils/save_pref.inc in Roundcube webmail before 0.8.7 and 0.9.x before 0.9.5 allows remote attackers to modify configuration settings via the _session parameter, which can be leveraged to read arbitrary files, conduct SQL injection attacks, and execute arbitrary code.","modified":"2025-07-16T08:16:32.444504Z","published":"2013-11-05T18:55:00Z","withdrawn":"2025-07-18T16:42:56Z","upstream":["CVE-2013-6172"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-6172"},{"type":"REPORT","url":"http://roundcube.net/news/2013/10/21/security-updates-095-and-087/"},{"type":"REPORT","url":"http://trac.roundcube.net/ticket/1489382"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2013-6172"}],"affected":[{"package":{"name":"roundcube","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/roundcube@0.9.5-2?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.5-2"}]}],"versions":["0.9.2-2","0.9.4-1","0.9.5-1"],"ecosystem_specific":{"binaries":[{"binary_name":"roundcube","binary_version":"0.9.5-2"},{"binary_name":"roundcube-core","binary_version":"0.9.5-2"},{"binary_name":"roundcube-mysql","binary_version":"0.9.5-2"},{"binary_name":"roundcube-pgsql","binary_version":"0.9.5-2"},{"binary_name":"roundcube-plugins","binary_version":"0.9.5-2"},{"binary_name":"roundcube-sqlite3","binary_version":"0.9.5-2"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-6172.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}