Input validation error in JavaMail API (compat) - CVE-2011-0739
Published: February 2, 2011 / Updated: August 11, 2020
JavaMail API (compat)
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The deliver function in the sendmail delivery agent (lib/mail/network/delivery_methods/sendmail.rb) in Ruby Mail gem 2.2.14 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail address.
How to mitigate CVE-2011-0739
Sources
- http://groups.google.com/group/mail-ruby/browse_thread/thread/e93bbd05706478dd?pli=1
- http://osvdb.org/70667
- http://secunia.com/advisories/43077
- http://www.securityfocus.com/bid/46021
- http://www.vupen.com/english/advisories/2011/0233
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65010
- https://github.com/mikel/mail/raw/master/patches/20110126_sendmail.patch