CVE-2023-27985

emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:*

History

09 Jun 2023, 07:15

Type Values Removed Values Added
Summary emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90
References
  • (MISC) https://www.gabriel.urdhr.fr/2023/06/08/emacsclient-mail-shell-elisp-injections/ -

Information

Published : 2023-03-09 06:15

Updated : 2024-02-28 19:51


NVD link : CVE-2023-27985

Mitre link : CVE-2023-27985

CVE.ORG link : CVE-2023-27985


JSON object : View

Products Affected

gnu

  • emacs
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')