Moderate severityNVD Advisory· Published Feb 2, 2011· Updated Apr 29, 2026
CVE-2011-0739
CVE-2011-0739
Description
The deliver function in the sendmail delivery agent (lib/mail/network/delivery_methods/sendmail.rb) in Ruby Mail gem 2.2.14 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail address.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mailRubyGems | < 2.2.15 | 2.2.15 |
Affected products
53cpe:2.3:a:mikel_lindsaar:mail:*:*:*:*:*:*:*:*+ 51 more
- cpe:2.3:a:mikel_lindsaar:mail:*:*:*:*:*:*:*:*range: <=2.2.14
- cpe:2.3:a:mikel_lindsaar:mail:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_lindsaar:mail:2.2.9.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- groups.google.com/group/mail-ruby/browse_thread/thread/e93bbd05706478ddnvdPatchWEB
- secunia.com/advisories/43077nvdVendor Advisory
- www.vupen.com/english/advisories/2011/0233nvdVendor Advisory
- github.com/advisories/GHSA-cpjc-p7fc-j9xhghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2011-0739ghsaADVISORY
- exchange.xforce.ibmcloud.com/vulnerabilities/65010nvdWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/mail/CVE-2011-0739.ymlghsaWEB
- web.archive.org/web/20200228225346/http://www.securityfocus.com/bid/46021ghsaWEB
- osvdb.org/70667nvd
- www.securityfocus.com/bid/46021nvd
News mentions
0No linked articles in our index yet.