Lucene search

K
githubGitHub Advisory DatabaseGHSA-RP63-JFMW-532W
HistoryOct 24, 2017 - 6:33 p.m.

Mail Gem Improper Input Validation vulnerability

2017-10-2418:33:38
CWE-20
GitHub Advisory Database
github.com
9

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.013 Low

EPSS

Percentile

86.1%

The Mail gem before 2.4.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery.

Affected configurations

Vulners
Node
claws-mailmailRange<2.4.3
CPENameOperatorVersion
maillt2.4.3

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.013 Low

EPSS

Percentile

86.1%