Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.
The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ruby | Ruby-lang | * | 2.4.0 (including) |
Ruby1.9.1 | Ubuntu | trusty | * |
Ruby1.9.1 | Ubuntu | upstream | * |
Ruby2.0 | Ubuntu | trusty | * |
Ruby2.0 | Ubuntu | upstream | * |
Ruby2.3 | Ubuntu | devel | * |
Ruby2.3 | Ubuntu | upstream | * |
Ruby2.3 | Ubuntu | xenial | * |
Ruby2.3 | Ubuntu | yakkety | * |
Ruby2.3 | Ubuntu | zesty | * |