{"id":"CVE-2015-9097","details":"The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.","aliases":["GHSA-q86f-fmqf-qrf6"],"modified":"2026-01-27T04:15:20.690134Z","published":"2017-06-12T20:29:00Z","withdrawn":"2026-01-27T04:15:20.690134Z","references":[{"type":"ARTICLE","url":"http://openwall.com/lists/oss-security/2015/12/11/3"},{"type":"ADVISORY","url":"http://www.mbsd.jp/Whitepaper/smtpi.pdf"},{"type":"EVIDENCE","url":"https://github.com/mikel/mail/commit/72befdc4dab3e6e288ce226a7da2aa474cf5be83"},{"type":"REPORT","url":"https://github.com/mikel/mail/pull/1097"},{"type":"REPORT","url":"https://github.com/rubysec/ruby-advisory-db/issues/215"},{"type":"REPORT","url":"https://hackerone.com/reports/137631"},{"type":"REPORT","url":"https://rubysec.com/advisories/mail-OSVDB-131677"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}