Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-51747
HistoryFeb 27, 2024 - 2:15 p.m.

Design/Logic Flaw

2024-02-2714:15:00
PRIOn knowledge base
www.prio-n.com
4
logic flaw
apache james
smtp smuggling
line delimiter handling
interpretation difference
spf checks
data transaction
upgrade
non vulnerable versions
nvd

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.5%

Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling.

A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks.

The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction.

We recommend James users to upgrade to non vulnerable versions.

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.5%

Related for PRION:CVE-2023-51747