Vulnerability Details : CVE-2023-27986
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90.
Products affected by CVE-2023-27986
- cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-27986
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 35 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-27986
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2023-27986
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-27986
-
https://www.gabriel.urdhr.fr/2023/06/08/emacsclient-mail-shell-elisp-injections/
Shell command and Emacs Lisp injection in emacsclient-mail.desktop - /dev/posts/
-
http://www.openwall.com/lists/oss-security/2023/03/09/1
oss-security - Re: Shell command and Emacs Lisp code injection in emacsclient-mail.desktopMailing List;Patch
-
https://www.openwall.com/lists/oss-security/2023/03/08/2
oss-security - Shell command and Emacs Lisp code injection in emacsclient-mail.desktopMailing List;Patch
-
http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=3c1693d08b0a71d40a77e7b40c0ebc42dca2d2cc
emacs.git - Emacs source repositoryIssue Tracking;Patch
Jump to