CVE Vulnerabilities

CVE-2015-9096

Improper Neutralization of CRLF Sequences ('CRLF Injection')

Published: Jun 12, 2017 | Modified: Apr 20, 2025
CVSS 3.x
6.1
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
5.3 LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.

Weakness

The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.

Affected Software

NameVendorStart VersionEnd Version
RubyRuby-lang*2.4.0 (including)
Ruby1.9.1Ubuntutrusty*
Ruby1.9.1Ubuntuupstream*
Ruby2.0Ubuntutrusty*
Ruby2.0Ubuntuupstream*
Ruby2.3Ubuntudevel*
Ruby2.3Ubuntuesm-infra/xenial*
Ruby2.3Ubuntuupstream*
Ruby2.3Ubuntuxenial*
Ruby2.3Ubuntuyakkety*
Ruby2.3Ubuntuzesty*

Potential Mitigations

References