cnvd-2017-33209
Vulnerability from cnvd
Title
Ruby mail gem命令注入漏洞
Description
Ruby是日本软件开发者松本行弘所研发的一种跨平台、面向对象的动态类型编程语言。mail gem是其中的一个电子邮件处理库。 Ruby mail gem 2.5.5之前的版本中存在命令注入漏洞。攻击者可借助RCPT TO或MAIL FROM命令中的CRLF序列利用该漏洞修改使用gem发送的消息。
Severity
Patch Name
Ruby mail gem命令注入漏洞的补丁
Patch Description
Ruby是日本软件开发者松本行弘所研发的一种跨平台、面向对象的动态类型编程语言。mail gem是其中的一个电子邮件处理库。 Ruby mail gem 2.5.5之前的版本中存在命令注入漏洞。攻击者可借助RCPT TO或MAIL FROM命令中的CRLF序列利用该漏洞修改使用gem发送的消息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://github.com/mikel/mail/pull/1097

Reference
https://github.com/mikel/mail/pull/1097
Impacted products
Name
Ruby Ruby <2.5.5
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2015-9097",
      "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9097"
    }
  },
  "description": "Ruby\u662f\u65e5\u672c\u8f6f\u4ef6\u5f00\u53d1\u8005\u677e\u672c\u884c\u5f18\u6240\u7814\u53d1\u7684\u4e00\u79cd\u8de8\u5e73\u53f0\u3001\u9762\u5411\u5bf9\u8c61\u7684\u52a8\u6001\u7c7b\u578b\u7f16\u7a0b\u8bed\u8a00\u3002mail gem\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u7535\u5b50\u90ae\u4ef6\u5904\u7406\u5e93\u3002\r\n\r\nRuby mail gem 2.5.5\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u5b58\u5728\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9RCPT TO\u6216MAIL FROM\u547d\u4ee4\u4e2d\u7684CRLF\u5e8f\u5217\u5229\u7528\u8be5\u6f0f\u6d1e\u4fee\u6539\u4f7f\u7528gem\u53d1\u9001\u7684\u6d88\u606f\u3002",
  "discovererName": "unknwon",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/mikel/mail/pull/1097",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-33209",
  "openTime": "2017-11-08",
  "patchDescription": "Ruby\u662f\u65e5\u672c\u8f6f\u4ef6\u5f00\u53d1\u8005\u677e\u672c\u884c\u5f18\u6240\u7814\u53d1\u7684\u4e00\u79cd\u8de8\u5e73\u53f0\u3001\u9762\u5411\u5bf9\u8c61\u7684\u52a8\u6001\u7c7b\u578b\u7f16\u7a0b\u8bed\u8a00\u3002mail gem\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u7535\u5b50\u90ae\u4ef6\u5904\u7406\u5e93\u3002\r\n\r\nRuby mail gem 2.5.5\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u5b58\u5728\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9RCPT TO\u6216MAIL FROM\u547d\u4ee4\u4e2d\u7684CRLF\u5e8f\u5217\u5229\u7528\u8be5\u6f0f\u6d1e\u4fee\u6539\u4f7f\u7528gem\u53d1\u9001\u7684\u6d88\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Ruby mail gem\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Ruby Ruby \u003c2.5.5"
  },
  "referenceLink": "https://github.com/mikel/mail/pull/1097",
  "serverity": "\u4e2d",
  "submitTime": "2017-11-01",
  "title": "Ruby mail gem\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…