Логотип exploitDog
bind:CVE-2023-51747
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-51747

Количество 3

Количество 3

redhat логотип

CVE-2023-51747

почти 2 года назад

Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2023-51747

почти 2 года назад

Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-p5q9-86w4-2xr5

почти 2 года назад

SMTP smuggling in Apache James

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-51747

Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions.

CVSS3: 7.4
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-51747

Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions.

CVSS3: 7.1
0%
Низкий
почти 2 года назад
github логотип
GHSA-p5q9-86w4-2xr5

SMTP smuggling in Apache James

CVSS3: 7.1
0%
Низкий
почти 2 года назад

Уязвимостей на страницу