GHSA-cpjc-p7fc-j9xh

Suggest an improvement
Source
https://github.com/advisories/GHSA-cpjc-p7fc-j9xh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-cpjc-p7fc-j9xh/GHSA-cpjc-p7fc-j9xh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-cpjc-p7fc-j9xh
Aliases
  • CVE-2011-0739
Published
2017-10-24T18:33:38Z
Modified
2024-12-03T06:08:10.244044Z
Summary
Mail Improper Input Validation vulnerability
Details

The deliver function in the sendmail delivery agent (lib/mail/network/delivery_methods/sendmail.rb) in Ruby Mail gem 2.2.14 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail address.

Database specific
{
    "nvd_published_at": "2011-02-02T01:00:07Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:32:10Z"
}
References

Affected packages

RubyGems / mail

Package

Name
mail
Purl
pkg:gem/mail

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.15

Affected versions

1.*

1.0.0
1.1.0
1.2.1
1.2.5
1.2.6
1.2.8
1.2.9
1.3.0
1.3.1
1.3.2
1.3.3
1.3.4
1.3.5
1.4.0
1.4.1
1.4.2
1.4.3
1.5.0
1.5.1
1.5.2
1.5.3
1.5.4
1.6.0

2.*

2.0.3
2.0.5
2.1.0
2.1.1
2.1.2
2.1.3
2.1.5
2.1.5.1
2.1.5.2
2.1.5.3
2.2.0
2.2.1
2.2.2
2.2.3
2.2.4
2.2.5
2.2.5.1
2.2.5.2
2.2.6
2.2.6.1
2.2.7
2.2.9
2.2.9.1
2.2.10
2.2.11
2.2.12
2.2.13
2.2.14