CVSROOT: /cvs Module name: ports Changes by: st...@cvs.openbsd.org 2017/11/09 09:28:55
Modified files: mail/roundcubemail: Tag: OPENBSD_6_2 Makefile distinfo mail/roundcubemail/pkg: Tag: OPENBSD_6_2 PLIST Log message: security update to roundcubemail-1.3.3: "Apparently this zero-day exploit is already being used by hackers to read Roundcubeâs configuration files. It requires a valid username/password as the exploit only works with a valid session. More details will be published soon under CVE-2017-16651. In order to check whether your Roundcube installation has been compromised check the access logs for requests like ?_task=settings&_action=upload-display&_from=timezone As mentioned above, the file disclosure only works for authenticated users and by finding such requests in the logs you should also be able to identify the account used for this unauthorized access. For mitigation we recommend to change the all credentials to external services like database or LDAP address books and preferably also the 'des_key' option in your config."