{"id":"ALPINE-CVE-2017-8114","details":"Roundcube Webmail allows arbitrary password resets by authenticated users. This affects versions before 1.0.11, 1.1.x before 1.1.9, and 1.2.x before 1.2.5. The problem is caused by an improperly restricted exec call in the virtualmin and sasl drivers of the password plugin.","modified":"2025-11-19T06:11:20.642052Z","published":"2017-04-29T19:59:00.217Z","upstream":["CVE-2017-8114"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2017-8114"}],"affected":[{"package":{"name":"roundcubemail","ecosystem":"Alpine:v3.2","purl":"pkg:apk/alpine/roundcubemail?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.9-r0"}]}],"versions":["0.2.1-r0","0.2.2-r0","0.3.1-r0","0.3.1-r1","0.4-r0","0.4-r1","0.4.2-r0","0.4.2-r1","0.5.1-r0","0.5.2-r0","0.5.2-r1","0.5.2-r2","0.5.3-r0","0.5.4-r0","0.6-r0","0.7-r0","0.7.1-r0","0.7.2-r0","0.8.0-r0","0.8.0-r1","0.8.1-r0","0.8.2-r0","0.8.3-r0","0.8.3-r1","0.8.4-r0","0.8.5-r0","0.8.6-r0","0.9.0-r0","0.9.1-r0","0.9.2-r0","0.9.3-r0","0.9.4-r0","0.9.5-r0","1.0.1-r0","1.0.2-r0","1.0.3-r0","1.0.4-r0","1.0.5-r0","1.1.0-r0","1.1.1-r0","1.1.2-r0","1.1.2-r1","1.1.2-r2","1.1.3-r0","1.1.4-r0","1.1.5-r0","1.1.6-r0","1.1.7-r0","1.1.8-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2017-8114.json"}},{"package":{"name":"roundcubemail","ecosystem":"Alpine:v3.3","purl":"pkg:apk/alpine/roundcubemail?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.9-r0"}]}],"versions":["0.2.1-r0","0.2.2-r0","0.3.1-r0","0.3.1-r1","0.4-r0","0.4-r1","0.4.2-r0","0.4.2-r1","0.5.1-r0","0.5.2-r0","0.5.2-r1","0.5.2-r2","0.5.3-r0","0.5.4-r0","0.6-r0","0.7-r0","0.7.1-r0","0.7.2-r0","0.8.0-r0","0.8.0-r1","0.8.1-r0","0.8.2-r0","0.8.3-r0","0.8.3-r1","0.8.4-r0","0.8.5-r0","0.8.6-r0","0.9.0-r0","0.9.1-r0","0.9.2-r0","0.9.3-r0","0.9.4-r0","0.9.5-r0","1.0.1-r0","1.0.2-r0","1.0.3-r0","1.0.4-r0","1.0.5-r0","1.1.0-r0","1.1.1-r0","1.1.2-r0","1.1.2-r1","1.1.2-r2","1.1.3-r0","1.1.4-r0","1.1.5-r0","1.1.6-r0","1.1.7-r0","1.1.8-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2017-8114.json"}},{"package":{"name":"roundcubemail","ecosystem":"Alpine:v3.4","purl":"pkg:apk/alpine/roundcubemail?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.5-r0"}]}],"versions":["0.2.1-r0","0.2.2-r0","0.3.1-r0","0.3.1-r1","0.4-r0","0.4-r1","0.4.2-r0","0.4.2-r1","0.5.1-r0","0.5.2-r0","0.5.2-r1","0.5.2-r2","0.5.3-r0","0.5.4-r0","0.6-r0","0.7-r0","0.7.1-r0","0.7.2-r0","0.8.0-r0","0.8.0-r1","0.8.1-r0","0.8.2-r0","0.8.3-r0","0.8.3-r1","0.8.4-r0","0.8.5-r0","0.8.6-r0","0.9.0-r0","0.9.1-r0","0.9.2-r0","0.9.3-r0","0.9.4-r0","0.9.5-r0","1.0.1-r0","1.0.2-r0","1.0.3-r0","1.0.4-r0","1.0.5-r0","1.1.0-r0","1.1.1-r0","1.1.2-r0","1.1.2-r1","1.1.2-r2","1.1.3-r0","1.1.4-r0","1.1.5-r0","1.1.5-r1","1.2.0-r0","1.2.0-r1","1.2.0-r2","1.2.2-r0","1.2.3-r0","1.2.4-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2017-8114.json"}},{"package":{"name":"roundcubemail","ecosystem":"Alpine:v3.5","purl":"pkg:apk/alpine/roundcubemail?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.5-r0"}]}],"versions":["0.2.1-r0","0.2.2-r0","0.3.1-r0","0.3.1-r1","0.4-r0","0.4-r1","0.4.2-r0","0.4.2-r1","0.5.1-r0","0.5.2-r0","0.5.2-r1","0.5.2-r2","0.5.3-r0","0.5.4-r0","0.6-r0","0.7-r0","0.7.1-r0","0.7.2-r0","0.8.0-r0","0.8.0-r1","0.8.1-r0","0.8.2-r0","0.8.3-r0","0.8.3-r1","0.8.4-r0","0.8.5-r0","0.8.6-r0","0.9.0-r0","0.9.1-r0","0.9.2-r0","0.9.3-r0","0.9.4-r0","0.9.5-r0","1.0.1-r0","1.0.2-r0","1.0.3-r0","1.0.4-r0","1.0.5-r0","1.1.0-r0","1.1.1-r0","1.1.2-r0","1.1.2-r1","1.1.2-r2","1.1.3-r0","1.1.4-r0","1.1.5-r0","1.1.5-r1","1.2.0-r0","1.2.0-r1","1.2.0-r2","1.2.1-r0","1.2.2-r0","1.2.3-r0","1.2.4-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2017-8114.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}