Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-28753

Опубликовано: 24 мар. 2026
Источник: redhat
CVSS3: 3.7
EPSS Низкий

Описание

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

A flaw was found in NGINX Plus and NGINX Open Source, specifically within the ngx_mail_smtp_module. This vulnerability allows an attacker-controlled DNS (Domain Name System) server to inject arbitrary headers into SMTP (Simple Mail Transfer Protocol) upstream requests. This is due to the improper handling of Carriage Return (CRLF) sequences in DNS responses. The primary consequence is the potential manipulation of these requests, which could alter their intended behavior.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10nginxFix deferred
Red Hat Enterprise Linux 8nginx:1.24/nginxFix deferred
Red Hat Enterprise Linux 9nginxFix deferred
Red Hat Enterprise Linux 9nginx:1.24/nginxFix deferred
Red Hat Enterprise Linux 9nginx:1.26/nginxFix deferred
Red Hat Hardened Images 1nginxNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-93
https://bugzilla.redhat.com/show_bug.cgi?id=2450780NGINX: NGINX Plus: NGINX Open Source: NGINX Plus and NGINX Open Source: Request manipulation via header injection in SMTP upstream requests

EPSS

Процентиль: 6%
0.00024
Низкий

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 3.7
nvd
7 дней назад

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 3.7
msrc
5 дней назад

NGINX ngx_mail_proxy_module vulnerability

CVSS3: 3.7
debian
7 дней назад

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_ ...

CVSS3: 3.7
github
7 дней назад

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

EPSS

Процентиль: 6%
0.00024
Низкий

3.7 Low

CVSS3