|
Message-ID: <5abe3d0eae67015fea3d3674277b45e7@tribut.de> Date: Wed, 09 Apr 2014 10:57:16 +0200 From: Felix Eckhofer <felix@...but.de> To: oss-security@...ts.openwall.com Subject: Session IP check bypass in Roundcube 1.0 Hi. Roundcube 1.0-beta added support for the the X-Forwarded-For and X-Real-IP HTTP headers when the check_ip configuration option is set. This effectively allows the attacker to bypass the session IP check completely by setting one of these headers to the victim's IP address. The problem is still present in the latest version (1.0). Bug is being tracked here: http://trac.roundcube.net/ticket/1489729 Regards felix
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.