Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS12YzZxLWNjajktOXI4Oc4AA6py

MailDev Remote Code Execution

MailDev 2 through 2.1.0 allows Remote Code Execution via a crafted Content-ID header for an e-mail attachment, leading to lib/mailserver.js writing arbitrary code into the routes.js file.

Permalink: https://github.com/advisories/GHSA-vc6q-ccj9-9r89
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12YzZxLWNjajktOXI4Oc4AA6py
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 27 days ago
Updated: about 24 hours ago


CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-vc6q-ccj9-9r89, CVE-2024-27448
References: Repository: https://github.com/Tim-Hoekstra/MailDev-2.1.0-Exploit-RCE
Blast Radius: 24.5

Affected Packages

npm:maildev
Dependent packages: 22
Dependent repositories: 313
Downloads: 186,330 last month
Affected Version Ranges: >= 2.0.0-beta1, <= 2.1.0
No known fixed version
All affected versions: 2.0.0, 2.0.0-beta1, 2.0.0-beta2, 2.0.0-beta3, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.1.0