{"id":"CVE-2018-14354","details":"An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.","modified":"2026-05-14T04:01:53.910875155Z","published":"2018-07-17T17:29:00.527Z","related":["SUSE-SU-2018:2084-1","SUSE-SU-2018:2085-1","SUSE-SU-2018:2403-1","SUSE-SU-2019:1196-1","openSUSE-SU-2024:11069-1","openSUSE-SU-2024:11079-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"12.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"14.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"16.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"18.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"9.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.6"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.7"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.5"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.6"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.7"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.6"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.7"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"http://www.mutt.org/news.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/104925"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2526"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html"},{"type":"ADVISORY","url":"https://neomutt.org/2018/07/16/release"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201810-07"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3719-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3719-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3719-3/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4277"},{"type":"FIX","url":"https://github.com/neomutt/neomutt/commit/95e80bf9ff10f68cb6443f760b85df4117cb15eb"},{"type":"FIX","url":"https://gitlab.com/muttmua/mutt/commit/185152818541f5cdc059cbff3f3e8b654fc27c1d"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/muttmua/mutt","events":[{"introduced":"0"},{"fixed":"ed9d7727dc705754871e31cb41420f0ea956495b"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"1.10.1"}],"cpe":"cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["mutt-1-10-rel","mutt-1-9-rel","mutt-1-8-rel","mutt-1-7-rel","mutt-1-6-rel","mutt-1-5-24-rel","mutt-1-5-22-rel","mutt-1-5-21-rel","mutt-1-5-20-rel","mutt-1-5-19-rel","mutt-1-5-18-rel","mutt-1-5-17-rel","mutt-1-5-16-rel","mutt-1-5-15-rel","mutt-1-5-6-rel","mutt-1-5-5-1-rel","mutt-1-5-5-rel","post-type-punning-patch","pre-type-punning-patch","mutt-1-5-4-rel","mutt-1-5-3-rel","mutt-1-5-2-rel","mutt-1-5-1-rel","mutt-1-3-27-rel","mutt-1-3-26-rel","mutt-1-3-25-rel","mutt-1-3-24-rel","mutt-1-3-23-2-rel","mutt-1-3-23-1-rel","mutt-1-3-23-rel","mutt-1-3-22-1-rel","mutt-1-3-22-rel","mutt-1-3-21-rel","mutt-1-3-20-rel","mutt-1-3-19-rel","mutt-1-3-18-rel","mutt-1-3-17-rel","mutt-1-3-16-rel","mutt-1-3-15-rel","mutt-1-3-14-rel","mutt-1-3-13-rel","mutt-1-3-12-rel","mutt-1-3-11-rel","mutt-1-3-10-rel","mutt-1-3-9-rel","mutt-1-3-8-rel","mutt-1-3-7-rel","mutt-1-3-6-rel","mutt-1-3-5-rel","mutt-1-3-4-rel","mutt-1-3-3-rel","mutt-1-3-2-rel","mutt-1-3-1-rel","mutt-1-3-rel","mutt-1-1-14-rel","mutt-1-1-13-rel","mutt-1-1-12-rel","mutt-1-1-11-rel","mutt-1-1-10-rel","mutt-1-1-9-rel","mutt-1-1-8-rel","mutt-1-1-7-rel","mutt-1-1-6-rel","mutt-1-1-5-rel","mutt-1-1-4-rel","mutt-1-1-3-rel","mutt-1-1-2-rel","mutt-1-1-1-2-rel","mutt-1-1-1-1-rel","mutt-1-1-1-rel","mutt-1-1-rel","mutt-0-96-8-rel","mutt-0-96-7-rel","mutt-0-96-6-rel","mutt-0-96-5-rel","mutt-0-96-4-rel","mutt-0-96-3-rel","mutt-0-96-2-slightly-post-release","mutt-0-96-1-rel","mutt-0-96-rel","mutt-0-95-rel","mutt-0-94-18-rel","mutt-0-94-17i-rel","mutt-0-94-16i-rel","mutt-0-94-15-rel","mutt-0-94-14-rel","mutt-0-94-13-rel","mutt-0-94-10i-rel","mutt-0-94-9i-p1","mutt-0-94-9i-rel","mutt-0-94-8i-rel","mutt-0-94-7i-rel","mutt-0-94-6i-rel","mutt-0-94-5i-rel","mutt-0-93-unstable","mutt-0-92-11i","mutt-0-92-10i","mutt-0-92-9i"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-14354.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/neomutt/neomutt","events":[{"introduced":"0"},{"fixed":"6a147a62cf39c2a12cf2e96a8a62f378164548fa"},{"fixed":"95e80bf9ff10f68cb6443f760b85df4117cb15eb"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"20180716"}],"cpe":"cpe:2.3:a:neomutt:neomutt:*:*:*:*:*:*:*:*","source":["CPE_FIELD","REFERENCES"]}}],"versions":["neomutt-20180622","neomutt-20180512","neomutt-20180323","neomutt-20180223","neomutt-20171215","neomutt-20171208","neomutt-20171027","neomutt-20171013","neomutt-20171006","neomutt-20170912","neomutt-20170907","neomutt-20170714","neomutt-20170707","neomutt-20170609","neomutt-20170602","neomutt-20170526","neomutt-20170428","neomutt-20170421","neomutt-20170414","neomutt-20170306","neomutt-20170225","neomutt-20170206","neomutt-20170128","neomutt-20170113","neomutt-20161126","neomutt-20161104","neomutt-20161028","neomutt-20161014","neomutt-20161003","neomutt-20161002","neomutt-20160916","neomutt-20160910","neomutt-20160827","neomutt-20160822"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-14354.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.com/muttmua/mutt","events":[{"introduced":"0"},{"fixed":"185152818541f5cdc059cbff3f3e8b654fc27c1d"}],"database_specific":{"source":"REFERENCES"}}],"versions":["mutt-1-10-rel","mutt-1-9-rel","mutt-1-8-rel","mutt-1-7-rel","mutt-1-6-rel","mutt-1-5-24-rel","mutt-1-5-22-rel","mutt-1-5-21-rel","mutt-1-5-20-rel","mutt-1-5-19-rel","mutt-1-5-18-rel","mutt-1-5-17-rel","mutt-1-5-16-rel","mutt-1-5-15-rel","mutt-1-5-6-rel","mutt-1-5-5-1-rel","mutt-1-5-5-rel","post-type-punning-patch","pre-type-punning-patch","mutt-1-5-4-rel","mutt-1-5-3-rel","mutt-1-5-2-rel","mutt-1-5-1-rel","mutt-1-3-27-rel","mutt-1-3-26-rel","mutt-1-3-25-rel","mutt-1-3-24-rel","mutt-1-3-23-2-rel","mutt-1-3-23-1-rel","mutt-1-3-23-rel","mutt-1-3-22-1-rel","mutt-1-3-22-rel","mutt-1-3-21-rel","mutt-1-3-20-rel","mutt-1-3-19-rel","mutt-1-3-18-rel","mutt-1-3-17-rel","mutt-1-3-16-rel","mutt-1-3-15-rel","mutt-1-3-14-rel","mutt-1-3-13-rel","mutt-1-3-12-rel","mutt-1-3-11-rel","mutt-1-3-10-rel","mutt-1-3-9-rel","mutt-1-3-8-rel","mutt-1-3-7-rel","mutt-1-3-6-rel","mutt-1-3-5-rel","mutt-1-3-4-rel","mutt-1-3-3-rel","mutt-1-3-2-rel","mutt-1-3-1-rel","mutt-1-3-rel","mutt-1-1-14-rel","mutt-1-1-13-rel","mutt-1-1-12-rel","mutt-1-1-11-rel","mutt-1-1-10-rel","mutt-1-1-9-rel","mutt-1-1-8-rel","mutt-1-1-7-rel","mutt-1-1-6-rel","mutt-1-1-5-rel","mutt-1-1-4-rel","mutt-1-1-3-rel","mutt-1-1-2-rel","mutt-1-1-1-2-rel","mutt-1-1-1-1-rel","mutt-1-1-1-rel","mutt-1-1-rel","mutt-0-96-8-rel","mutt-0-96-7-rel","mutt-0-96-6-rel","mutt-0-96-5-rel","mutt-0-96-4-rel","mutt-0-96-3-rel","mutt-0-96-2-slightly-post-release","mutt-0-96-1-rel","mutt-0-96-rel","mutt-0-95-rel","mutt-0-94-18-rel","mutt-0-94-17i-rel","mutt-0-94-16i-rel","mutt-0-94-15-rel","mutt-0-94-14-rel","mutt-0-94-13-rel","mutt-0-94-10i-rel","mutt-0-94-9i-p1","mutt-0-94-9i-rel","mutt-0-94-8i-rel","mutt-0-94-7i-rel","mutt-0-94-6i-rel","mutt-0-94-5i-rel","mutt-0-93-unstable","mutt-0-92-11i","mutt-0-92-10i","mutt-0-92-9i"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-14354.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}