mail 2.2.20

3 security vulnerabilities found in version 2.2.20

CVE-2012-2140 rubygem-mail: arbitrary command execution when using exim or sendmail from commandline

high severity CVE-2012-2140
high severity CVE-2012-2140
Patched versions: >= 2.4.4

The Mail gem before 2.4.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery.

CVE-2015-9097 rubygem-mail: SMTP injection via recipient email addresses

medium severity CVE-2015-9097
medium severity CVE-2015-9097
Patched versions: >= 2.5.5

The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.

CVE-2012-2139 rubygem-mail: directory traversal

medium severity CVE-2012-2139
medium severity CVE-2012-2139
Patched versions: >= 2.4.4

Directory traversal vulnerability in lib/mail/network/delivery_methods/file_delivery.rb in the Mail gem before 2.4.4 for Ruby allows remote attackers to read arbitrary files via a .. (dot dot) in the to parameter.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

Gem version without a license.


Unless a license that specifies otherwise is included, nobody can use, copy, distribute, or modify this library without being at risk of take-downs, shake-downs, or litigation.

This gem version is available.


This gem version has not been yanked and is still available for usage.