Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r8jw-rfx3-cj99

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

RITLabs The Bat! before 3.0.0.15 displays certain important headers from encapsulated data in message/partial MIME messages, instead of the real headers, which is in violation of RFC2046 header merging rules and allows remote attackers to spoof the origin of e-mail by sending a fragmented message, as demonstrated using spoofed Received: and Message-ID: headers.

RITLabs The Bat! before 3.0.0.15 displays certain important headers from encapsulated data in message/partial MIME messages, instead of the real headers, which is in violation of RFC2046 header merging rules and allows remote attackers to spoof the origin of e-mail by sending a fragmented message, as demonstrated using spoofed Received: and Message-ID: headers.

EPSS

Процентиль: 72%
0.00704
Низкий

Связанные уязвимости

nvd
почти 20 лет назад

RITLabs The Bat! before 3.0.0.15 displays certain important headers from encapsulated data in message/partial MIME messages, instead of the real headers, which is in violation of RFC2046 header merging rules and allows remote attackers to spoof the origin of e-mail by sending a fragmented message, as demonstrated using spoofed Received: and Message-ID: headers.

EPSS

Процентиль: 72%
0.00704
Низкий