CVE-2023-27985
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
09/03/2023
Last modified:
05/03/2025
Description
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:* | 28.1 (including) | 28.2 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=d32091199ae5de590a83f1542a01d75fba000467
- http://www.openwall.com/lists/oss-security/2023/03/09/1
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=60204
- https://www.gabriel.urdhr.fr/2023/06/08/emacsclient-mail-shell-elisp-injections/
- https://www.openwall.com/lists/oss-security/2023/03/08/2
- http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=d32091199ae5de590a83f1542a01d75fba000467
- http://www.openwall.com/lists/oss-security/2023/03/09/1
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=60204
- https://www.gabriel.urdhr.fr/2023/06/08/emacsclient-mail-shell-elisp-injections/
- https://www.openwall.com/lists/oss-security/2023/03/08/2



