Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-9096

Опубликовано: 12 июн. 2017
Источник: debian
EPSS Низкий

Описание

Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby2.3fixed2.3.3-1+deb9u1package
ruby2.1removedpackage
ruby1.9.1removedpackage
ruby1.9.1no-dsawheezypackage
ruby1.8removedpackage
ruby1.8no-dsawheezypackage

Примечания

  • https://github.com/ruby/ruby/commit/0827a7e52ba3d957a634b063bf5a391239b9ffee

  • https://github.com/rubysec/ruby-advisory-db/issues/215

EPSS

Процентиль: 81%
0.01592
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 8 лет назад

Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.

CVSS3: 5.3
redhat
больше 8 лет назад

Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.

CVSS3: 6.1
nvd
больше 8 лет назад

Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.

CVSS3: 6.1
github
больше 3 лет назад

Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.

suse-cvrf
больше 5 лет назад

Security update for ruby2.1

EPSS

Процентиль: 81%
0.01592
Низкий
Уязвимость CVE-2015-9096