logo

CVE-2023-51747 org.apache.james:james-server

Package

Manager: maven
Name: org.apache.james:james-server
Vulnerable Version: >=0 <3.7.5 || =3.8.0 || >=3.8.0 <3.8.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00246 pctl0.47762

Details

SMTP smuggling in Apache James Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions.

Metadata

Created: 2024-02-27T15:30:31Z
Modified: 2024-11-13T23:26:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-p5q9-86w4-2xr5/GHSA-p5q9-86w4-2xr5.json
CWE IDs: ["CWE-20", "CWE-290"]
Alternative ID: GHSA-p5q9-86w4-2xr5
Finding: F032
Auto approve: 1