Sha256: 652d48548b42e5cec42911c6f9bc7838d4c3ba0642dc235d71d3e6db8fe9cbfe
Contents?: true
Size: 662 Bytes
Versions: 2
Compression:
Stored size: 662 Bytes
Contents
--- engine: ruby cve: 2015-9096 url: https://hackerone.com/reports/137631 title: SMTP command injection date: 2015-12-09 description: | Net::SMTP is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring. Applications that validate email address format are not affected by this vulnerability. The injection attack is described in Terada, Takeshi. "SMTP Injection via Recipient Email Addresses." 2015. The attacks described in the paper (Terada, p. 4) can be applied to without any modification. patched_versions: - ">= 2.4.0"
Version data entries
2 entries across 2 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.6.1 | data/ruby-advisory-db/rubies/ruby/CVE-2015-9096.yml |
bundler-audit-0.6.0 | data/ruby-advisory-db/rubies/ruby/CVE-2015-9096.yml |