Description
Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.4.24, 0.5.14, and 0.6.4, symbol arguments to commands are vulnerable to a CRLF Injection / IMAP Command injection via Symbol arguments passed to IMAP commands. This issue has been patched in versions 0.4.24, 0.5.14, and 0.6.4.
Problem types
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')
Product status
>= 0.5.0, < 0.5.14
>= 0.6.0, < 0.6.4
References
github.com/...t-imap/security/advisories/GHSA-75xq-5h9v-w6px
github.com/ruby/net-imap/releases/tag/v0.4.24
github.com/ruby/net-imap/releases/tag/v0.5.14
github.com/ruby/net-imap/releases/tag/v0.6.4