{"id":"UBUNTU-CVE-2015-2180","details":"The DBMail driver in the Password plugin in Roundcube before 1.1.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the password.","modified":"2025-07-16T07:02:10.310295Z","published":"2017-01-30T22:59:00Z","withdrawn":"2025-07-18T16:43:10Z","upstream":["CVE-2015-2180"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-2180"},{"type":"REPORT","url":"http://trac.roundcube.net/ticket/1490261"},{"type":"REPORT","url":"http://advisories.mageia.org/MGASA-2015-0400.html"},{"type":"REPORT","url":"http://lists.opensuse.org/opensuse-updates/2015-07/msg00032.html"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2015-2180"}],"affected":[{"package":{"name":"roundcube","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/roundcube@1.3.6+dfsg.1-1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.6+dfsg.1-1"}]}],"versions":["1.3.0+dfsg.1-1","1.3.1+dfsg.1-1","1.3.3+dfsg.1-1","1.3.3+dfsg.1-2"],"ecosystem_specific":{"binaries":[{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-core"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-mysql"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-pgsql"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-plugins"},{"binary_version":"1.3.6+dfsg.1-1","binary_name":"roundcube-sqlite3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-2180.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}