Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1wN3ZtLXBoeHgtZzcyMs4AAa3u
Improper Input Validation in Apache Commons Email
When a call-site passes a subject for an email that contains line-breaks in Apache Commons Email 1.0 through 1.4, the caller can add arbitrary SMTP headers.
Permalink: https://github.com/advisories/GHSA-p7vm-phxx-g722JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wN3ZtLXBoeHgtZzcyMs4AAa3u
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: over 1 year ago
CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Identifiers: GHSA-p7vm-phxx-g722, CVE-2017-9801
References:
- https://nvd.nist.gov/vuln/detail/CVE-2017-9801
- https://lists.apache.org/thread.html/7ef903a772a2ff08605df1be819044fb15df2815eb3d63878b3fbbb5@%3Cannounce.apache.org%3E
- http://www.securityfocus.com/bid/100082
- http://www.securitytracker.com/id/1039043
- https://github.com/advisories/GHSA-p7vm-phxx-g722
Affected Packages
maven:org.apache.commons:commons-email
Dependent packages: 476Dependent repositories: 9,965
Downloads:
Affected Version Ranges: >= 1.0, <= 1.4
Fixed in: 1.5
All affected versions: 1.3.1, 1.3.2, 1.3.3
All unaffected versions: 1.6.0