The developers of Roundcube Webmail, one of the world’s most popular open-source webmail platforms, have released urgent security updates in versions 1.6.11 and 1.5.10 to address a critical remote code execution (RCE) vulnerability.
The flaw, reported by security researcher firs0v, could allow authenticated attackers to execute arbitrary code on vulnerable servers via PHP Object Deserialization, putting countless email servers at risk.
PHP object deserialization vulnerabilities have long been a favored attack vector, especially in PHP-based platforms handling user-supplied data.
In this case, the Roundcube team patched an issue where, after successful authentication, a maliciously crafted payload could be supplied to trigger deserialization of untrusted data.
This would allow an attacker to instantiate arbitrary PHP objects, leading to remote execution of code on the underlying server.
Technical Overview:
PHP’s unserialize() function can be dangerous if used with untrusted input. When application logic deserializes user-controllable data, attackers can craft serialized objects that exploit “magic methods” (e.g., __wakeup, __destruct) or known gadget chains in the application or underlying libraries.
For example, the exploit could look like this in a simplified way:
php// Vulnerable pseudocode
$userObj = unserialize($_POST['user']);
If $_POST['user'] contained a malicious object definition, this could lead to execution of arbitrary code.
While the Roundcube team did not publish exploit specifics (in line with responsible disclosure), administrators are urged to assume exploitation is trivial for skilled attackers and act immediately.
The Roundcube team has released version 1.6.11 and 1.5.10, both considered stable. These versions address the critical deserialization bug and also include several minor bug fixes and improvements:
Alongside the RCE mitigation, the update includes:
Example Changelog Snippet:
- Fix Post-Auth RCE via PHP Object Deserialization reported by firs0v.
- Fix bug where attachments with content type of application/vnd.ms-tnef were not parsed.
- Improve installer to clarify options for disabling SMTP authentication.
Exploitation of authentication-gated vulnerabilities is widespread, as attackers may leverage stolen credentials to pivot into deeper exploitation particularly on shared or multi-tenant email servers. Historical incidents show that attackers often chain authentication bypass bugs with deserialization RCEs, making quick patching especially crucial.
Roundcube is a core component in thousands of enterprise and academic mail systems. A successful compromise could expose sensitive communications, allow further lateral movement, or enable destructive attacks like ransomware deployment via email.
Key Recommendations
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…