Lucene search

K
githubGitHub Advisory DatabaseGHSA-P5Q9-86W4-2XR5
HistoryFeb 27, 2024 - 3:30 p.m.

SMTP smuggling in Apache James

2024-02-2715:30:31
CWE-20
GitHub Advisory Database
github.com
6
apache james
smtp smuggling
vulnerability
line delimiter
spf checks
crlf
upgrade

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.5%

Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling.

A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks.

The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction.

We recommend James users to upgrade to non vulnerable versions.

Affected configurations

Vulners
Node
org.apache.james\jamesMatchserver3.8.0
OR
org.apache.james\jamesMatchserver

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.5%

Related for GHSA-P5Q9-86W4-2XR5