Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12YzZxLWNjajktOXI4Oc4AA6py
MailDev Remote Code Execution
MailDev 2 through 2.1.0 allows Remote Code Execution via a crafted Content-ID header for an e-mail attachment, leading to lib/mailserver.js
writing arbitrary code into the routes.js
file.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12YzZxLWNjajktOXI4Oc4AA6py
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 8 months ago
Updated: 7 months ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-vc6q-ccj9-9r89, CVE-2024-27448
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-27448
- https://github.com/Tim-Hoekstra/MailDev-2.1.0-Exploit-RCE
- https://github.com/maildev/maildev/releases
- https://intrix.com.au/articles/exposing-major-security-flaw-in-maildev
- https://github.com/maildev/maildev/issues/467
- https://gist.github.com/stypr/fe2003f00959f7e3d92ab9d5260433f8
- https://github.com/advisories/GHSA-vc6q-ccj9-9r89
Blast Radius: 24.5
Affected Packages
npm:maildev
Dependent packages: 22Dependent repositories: 313
Downloads: 240,860 last month
Affected Version Ranges: >= 2.0.0-beta1, <= 2.1.0
No known fixed version
All affected versions: 2.0.0, 2.0.0-beta1, 2.0.0-beta2, 2.0.0-beta3, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.1.0