Sha256: 81b8873dc07bba177e1d8e850798ad214febccbfbb6aa142a78132d9fd433580

Contents?: true

Size: 883 Bytes

Versions: 5

Compression:

Stored size: 883 Bytes

Contents

---
gem: mail
cve: 2015-9097
osvdb: 131677
url: https://hackerone.com/reports/137631
title: SMTP command injection
date: 2015-12-09
description: |
  Because Mail does not disallow CRLF in email addresses, an attacker can
  inject SMTP commands in specially crafted email addresses passed to
  RCPT TO and MAIL FROM.

  Not affected by this vulnerability:
    * Ruby 2.4.0+ with a fix for CVE-2015-9096.
    * Applications that do not use SMTP delivery.
    * Applications that validate email addresses to not include CRLF.

  The injection attack is described in Terada, Takeshi. "SMTP Injection via
  Recipient Email Addresses." 2015. The attacks described in the paper
  (Terada, p. 4) can be applied to the library without any modification.
patched_versions:
- ">= 2.5.5"
related:
  url:
    - http://www.mbsd.jp/Whitepaper/smtpi.pdf
    - https://github.com/mikel/mail/pull/1097

Version data entries

5 entries across 5 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/mail/CVE-2015-9097.yml
bundler-budit-0.6.2 data/ruby-advisory-db/gems/mail/OSVDB-131677.yml
bundler-budit-0.6.1 data/ruby-advisory-db/gems/mail/OSVDB-131677.yml
bundler-audit-0.6.1 data/ruby-advisory-db/gems/mail/OSVDB-131677.yml
bundler-audit-0.6.0 data/ruby-advisory-db/gems/mail/OSVDB-131677.yml