Описание
Apache James MIME4J improper input validation vulnerability
Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message. This can be exploited by an attacker to add unintended headers to MIME messages.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-21742
- https://github.com/apache/james-mime4j/commit/9dec5df2a588fed8027839815daefa79ee66efd1
- https://github.com/apache/james-mime4j/commit/d25fb3fd35db42b060789a20634fbe3cb84aba17
- https://lists.apache.org/thread/nrqzg93219wdj056pqfszsd33dc54kfy
- http://www.openwall.com/lists/oss-security/2024/02/27/5
Пакеты
org.apache.james:apache-mime4j-core
< 0.8.10
0.8.10
Связанные уязвимости
Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message. This can be exploited by an attacker to add unintended headers to MIME messages.
Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message. This can be exploited by an attacker to add unintended headers to MIME messages.
Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message. This can be exploited by an attacker to add unintended headers to MIME messages.
Improper input validation allows for header injection in MIME4J librar ...
Уязвимость синтаксического анализатора сообщений электронной почты Apache James Mime4J, связанная с недостаточной проверкой входных данных, позволяющая нарушителю выполнить произвольный код