First published: Thu Mar 09 2023(Updated: )
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Emacs | >=28.1<=28.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27986 is a vulnerability in Emacs 28.1 through 28.2 that allows Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters.
Attackers can exploit CVE-2023-27986 by sending a malicious mailto: URI with unescaped double-quote characters, which can execute arbitrary Emacs Lisp code.
CVE-2023-27986 has a severity rating of high, with a CVSS severity value of 7.8.
You can fix CVE-2023-27986 by updating Emacs to version 29.0.90 or later where the vulnerability is fixed.
Yes, you can find additional resources about CVE-2023-27986 at the following URLs: [http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=3c1693d08b0a71d40a77e7b40c0ebc42dca2d2cc](http://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=3c1693d08b0a71d40a77e7b40c0ebc42dca2d2cc), [http://www.openwall.com/lists/oss-security/2023/03/09/1](http://www.openwall.com/lists/oss-security/2023/03/09/1), [https://www.gabriel.urdhr.fr/2023/06/08/emacsclient-mail-shell-elisp-injections/](https://www.gabriel.urdhr.fr/2023/06/08/emacsclient-mail-shell-elisp-injections/).