chore(deps): update dependency net-imap to v0.6.4 [security]#1256
Open
renovate[bot] wants to merge 1 commit intostagingfrom
Open
chore(deps): update dependency net-imap to v0.6.4 [security]#1256renovate[bot] wants to merge 1 commit intostagingfrom
renovate[bot] wants to merge 1 commit intostagingfrom
Conversation
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## staging #1256 +/- ##
========================================
Coverage 77.59% 77.59%
========================================
Files 54 54
Lines 1406 1406
========================================
Hits 1091 1091
Misses 315 315 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
0.6.2→0.6.4net-imap vulnerable to STARTTLS stripping via invalid response timing
CVE-2026-42246 / GHSA-vcgp-9326-pqcp
More information
Details
Summary
A man-in-the-middle attacker can cause
Net::IMAP#starttlsto return "successfully", without starting TLS.Details
When using
Net::IMAP#starttlsto upgrade a plaintext connection to use TLS, a man-in-the-middle attacker can inject a taggedOKresponse with an easily predictable tag. By sending the response before the client finishes sending the command, the command completes "successfully" before the response handler is registered. This allows#starttlsto return without error, but the response handler is never invoked, the TLS connection is never established, and the socket remains unencrypted.This allows man-in-the-middle attackers to perform a STARTTLS stripping attack, unless the client code explicitly checks
Net::IMAP#tls_verified?.Impact
TLS bypass, leading to cleartext transmission of sensitive information.
Mitigation
#starttlsdoes not establish TLS.STARTTLSwith a cleartext port.This is strongly recommended anyway:
Net::IMAP#tls_verified?istrue, before using the connection after#starttls.Severity
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
net-imap has quadratic complexity when reading response literals
CVE-2026-42245 / GHSA-q2mw-fvj9-vvcw
More information
Details
Summary
Net::IMAP::ResponseReaderhas quadratic time complexity when reading large responses containing many string literals. A hostile server can send responses which are crafted to exhaust the client's CPU for a denial of service attack.Details
For each literal in a response,
ResponseReaderrescans the entire growing response buffer. The regular expression that is used to scan the response buffer runs in linear time. With many literals, this becomes O(n²) total work. The regular expression should run in constant time: it is anchored to the end and only the last 23 bytes of the buffer are relevant.Because the algorithmic complexity is super-linear, this bypasses protection from
max_response_size: a response can stay well below the default size limit while still causing very large CPU cost.Net::IMAP::ResponseReaderruns continuously in the receiver thread until the connection closes.Impact
This consumes disproportionate CPU time in the client's receiver thread. A hostile server could use this to exhaust the client's CPU for a denial of service attack.
For a response near the default
max_response_size, each individual regexp scan could take between 100 to 200ms on common modern hardware, and this may be repeated 200k times per megabyte of response. While the regexp is scanning, it retains the Global VM lock, preventing other threads from running.Although other threads should not be completely blocked, their run time will be significantly impacted.
Mitigation
max_response_size(for example: 8KiB) will limit the impact. Although this is too small for fetching unpaginated message bodies, it should be enough for most other operations.Severity
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
net-imap vulnerable to denial of service via high iteration count for
SCRAM-*authenticationCVE-2026-42256 / GHSA-87pf-fpwv-p7m7
More information
Details
Summary
When authenticating a connection with
SCRAM-SHA1orSCRAM-SHA256, a hostile server can perform a computational denial-of-service attack on the client process by sending a big iteration count value.Details
A hostile IMAP server can send an arbitrarily large PBKDF2 iteration count in the SCRAM server-first-message, causing the client to perform an expensive
OpenSSL::KDF.pbkdf2_hmaccall. Because the PBKDF2 function is a blocking C extension and holds onto Ruby’s Global VM Lock, it can freeze the entire Ruby VM for the duration of the computation.OpenSSL enforces an effective maximum by using a 32-bit signed integer for the iteration count, Depending on hardware capabilities and OpenSSL version, this iteration count may be sufficient for to block all Ruby threads in the process for over seven minutes.
This is listed as one of the "Security Considerations", in RFC 7804:
Impact
During SCRAM authentication to a hostile server, the entire Ruby VM will be locked for the duration of the computation. Depending on hardware capabilities and OpenSSL version, this may take many minutes.
OpenSSL::KDF.pbkdf2_hmacis a blocking C function, soTimeoutcannot be used to guard against this. And it retains the Global VM lock, so other ruby threads will also be unable to run.Mitigation
Upgrade to a patched version of
net-imapthat adds themax_iterationsoption to theSASL-*authenticators, and callNet::IMAP#authenticatewith amax_iterationskeyword argument.NOTE: The default
max_iterationsis2³¹ - 1, the maximum signed 32 bit integer, the maximum allowed by OpenSSL.To prevent a denial of service attack, this must be set to a safe value, depending on hardware and version of OpenSSL.
It is the user's responsibility to enforce minimum and maximum iteration counts that are appropriate for their security context.
Alternatively, avoid
SCRAM-*mechanisms when authenticating to untrusted servers.Severity
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
net-imap vulnerable to command Injection via unvalidated Symbol inputs
CVE-2026-42258 / GHSA-75xq-5h9v-w6px
More information
Details
Summary
Symbol arguments to commands are vulnerable to a CRLF Injection / IMAP Command injection via Symbol arguments passed to IMAP commands.
Details
Symbol arguments represent IMAP "system flags", which are formatted as "atoms" (with no quoting) with a
"\"prefix. Vulnerable versions of Net::IMAP sends the symbol name directly to the socket, with no validation.Because the Symbol input is unvalidated, it could contain invalid
flagcharacters, includingSPandCRLF, which could be used to finish the current command and inject new commands.Although IMAP
flagarguments are only valid input for a few IMAP commands, most Net::IMAP commands use generic argument handling, and will allow Symbol (flag) inputs.Note also that the list of valid symbol inputs should be restricted to an enumerated set of standard RFC defined flag types, which have each been given specific defined semantics. Any user-provided values outside of that list of standard "system flags" needs to use the IMAP
keywordsyntax, which are sent as atoms, i.e: string inputs. Under no circumstances should#to_symever be called on unvetted user-provided input: that will always be a bug in the calling code for the simple reason thatuser_input_atomis as\user_input_atom.For forward compatibility with future IMAP extentions, Net::IMAP, does not restrict flag inputs to an enumerated list. That is the responsibility of the calling application code, which knows which flag semantics are valid for its context.
Impact
If a developer passes user-controlled input as a Symbol to most Net::IMAP commands, an attacker can append CRLF sequence followed by a new IMAP command (like
DELETE mailbox).Mitigation
Upgrade to a version of Net::IMAP that validates Symbols are valid as an IMAP
flag.User-provided input should never be able to control calling
#to_symon string arguments.For example, do not unsafely serialize and deserialize command arguments (e.g. with YAML or Marshal) in a way that could create unvetted Symbol arguments.
For the few IMAP commands which do allow
flagarguments, it may be appropriate to hard-code Symbol arguments or restrict them to an enumerated list which is valid for the calling application.Severity
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:N/VI:H/VA:L/SC:N/SI:N/SA:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
net-imap vulnerable to command Injection via "raw" arguments to multiple commands
CVE-2026-42257 / GHSA-hm49-wcqc-g2xg
More information
Details
Summary
Several
Net::IMAPcommands accept a raw string argument that is sent to the server without validation or escaping. If this string is derived from user-controlled input, it may contain containCRLFsequences, which an attacker can use to inject arbitrary IMAP commands.Details
Net::IMAP's generic argument handling, used by most command arguments, interprets string arguments as an IMAPastring. Depending on the string contents and the connection's UTF-8 support, this encodes strings as either aatom,quoted, orliteral. These are safe from command or argument injection.But the following commands transform specific String arguments to
Net::IMAP::RawData, which bypasses normal argument validation and encoding and prints the string directly to the socket:#uid_search,#searchcriteriais a String, it is sent raw#uid_fetch,#fetchattris a String, it is sent rawattris an Array, each String inattris sent raw#uid_store,#storeattris a String, it is sent raw#setquota:limitis interpolated with#to_sand that string is sent rawBecause these string arguments are sent without any neutralization, they serve as a direct vector for command splitting. Any user controlled data interpolated into these strings can be used to break out of the intended command context.
Using "raw data" arguments for
#uid_store,#store, and#setquotaI both inappropriate and unnecessary.Net::IMAP's generic argument handling is sufficient to safely validate and encode their arguments. Users of the library probably do not expect arguments to these commands to be sent raw and might not be wary of passing unvalidated input.The API for search criteria and fetch attributes is intentionally low-level and "close to the wire". It allows developers to use some IMAP extensions without requiring explicit support from the library and allows developers to use complex IMAP grammar without complex argument translation. Even so, basic validation is appropriate and could neutralize command injection.
Although this was explicitly documented for search
criteria, it was insufficiently documented for fetchattr. So developers may not have realized that theattrargument to#fetchand#uid_fetchis sent as "raw data".Impact
If a developer passes an unvalidated user-controlled input for one of these method arguments, an attacker can append CRLF sequence followed by a new IMAP command (like DELETE mailbox). Although this does not directly enable data exfiltration, it could be combined with other attack vectors or knowledge of the target system's attributes, e.g.: shared mail folders or the application's installed response handlers.
The SEARCH, STORE, and FETCH commands, and their UID variants are some of the most commonly used features of the library. Applications that build search queries or fetch attributes dynamically based on user input (e.g., mail clients or archival tools) may be at significant risk.
Expected use of
Net::IMAP#setquotais much more limited:SETQUOTAis often only usable by users with special administrative privileges. Depending on the server, quota administration might be managed through server configuration rather than via the IMAP protocolSETQUOTAcommand. It is expected to be uncommonly used in system administration scripts or in interactive sessions, it should be completely controlled by trusted users, and should only use trusted inputs. Calling#setquotawith untrusted user input is expected to be a very uncommon use case. Please note however this might be combined with other attacks, for example CSRF, which provide unauthorized access to trusted inputs, and may specifically target users or scripts with administrator privileges.Mitigation
net-imapwhich:Net::IMAP::RawDatais composed of well-formed IMAPtext,literal, andliteral8values, with no unescapedNULL,CR, orLFbytes.Net::IMAP::RawDatafor#store,#uid_store, or#setquota.\rand\ncharacters.attrargument is often appropriate. Alternatively, user controlled inputs can be restricted to a small enumerated list which is valid for the calling application.Kernel#Integerto coerce and validate user controlled inputs to#setquotalimit.Severity
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:L/SC:N/SI:N/SA:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Release Notes
ruby/net-imap (net-imap)
v0.6.4Compare Source
What's Changed
🔒 Security
This release contains fixes for multiple vulnerabilities concerning
STARTTLSstripping, argument validation, and denial of service attacks.Breaking Changes
ResponseReadermemoizesConfig#max_response_sizein #642.Changes to
#max_response_sizenow take effect once per response, not on everyIO#read.NOTE: It is not expected that this will affect any current usage. See the PR for details.
Added
BINARYextention to#append(RFC3516) by @nevans in #616LITERAL+andLITERAL-non-synchronizing literals (RFC7888) by @nevans in #649ScramAuthenticator#max_iterationsby @nevans in #654number64andnz-number64to NumValidator by @nevans in #625MailboxQuota#quota_rootalias by @nevans in #636Net::IMAP#inspectwith basic state by @nevans in #612ResponseParseError#parser_methods(and override#==) by @nevans in #615Fixed
attras anatomin #658#setquotastorage limit argument in #659SSLContext#setupinstead of#freezeby @idahomst in #627#get_tagged_responseby @nevans in #633SearchResult#to_sequence_setin #644, reported by @QuintasanDocumentation
.documentand.rdoc_optionsfiles, where possible by @nevans in #619Other Changes
Miscellaneous
#setquotaby @nevans in #636New Contributors
Full Changelog: ruby/net-imap@v0.6.3...v0.6.4
v0.6.3Compare Source
What's Changed
Added
#detailed_messagetoResponseParseErrorby @nevans in #599TERMandFORCE_COLORby @nevans in #607NO_COLOR) by @nevans in #609Config#overrides?(opposite of#inherited?) by @nevans in #610Config#inherits_defaults?by @nevans in #611Fixed
resp-textwith invalidresp-text-codeby @nevans in #601Config.version_defaultsshould be read only by @nevans in #594Other Changes
Config::AttrAccessorsa little by @nevans in #606Fixes for unreleased code:
resp-textfallback by @nevans in #605Miscellaneous
Full Changelog: ruby/net-imap@v0.6.2...v0.6.3
Configuration
📅 Schedule: (in timezone Europe/Amsterdam)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.