Описание
mail_html template in Squishdot 1.5.0 and earlier does not properly validate the (1) email and (2) title variables, which allows remote attackers to bypass spam filters by injecting SMTP headers, probably due to a CRLF injection vulnerability.
Ссылки
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:squishdot:squishdot:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:squishdot:squishdot:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:squishdot:squishdot:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:squishdot:squishdot:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:squishdot:squishdot:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:squishdot:squishdot:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:squishdot:squishdot:1.5.0:*:*:*:*:*:*:*
EPSS
Процентиль: 73%
0.00787
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
mail_html template in Squishdot 1.5.0 and earlier does not properly validate the (1) email and (2) title variables, which allows remote attackers to bypass spam filters by injecting SMTP headers, probably due to a CRLF injection vulnerability.
EPSS
Процентиль: 73%
0.00787
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other