Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling.
A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks.
The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction.
We recommend James users to upgrade to non vulnerable versions.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/02/27/4 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/rxkwbkh9vgbl9rzx1fkllyk3krhgydko | Mailing List Vendor Advisory |
https://postfix.org/smtp-smuggling.html | Product |
https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ | Product |
http://www.openwall.com/lists/oss-security/2024/02/27/4 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/rxkwbkh9vgbl9rzx1fkllyk3krhgydko | Mailing List Vendor Advisory |
https://postfix.org/smtp-smuggling.html | Product |
https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ | Product |
Configurations
Configuration 1 (hide)
|
History
05 May 2025, 21:02
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apache james
Apache |
|
CPE | cpe:2.3:a:apache:james:3.7.5:*:*:*:*:*:*:* cpe:2.3:a:apache:james:3.8.1:*:*:*:*:*:*:* |
|
References | () http://www.openwall.com/lists/oss-security/2024/02/27/4 - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread/rxkwbkh9vgbl9rzx1fkllyk3krhgydko - Mailing List, Vendor Advisory | |
References | () https://postfix.org/smtp-smuggling.html - Product | |
References | () https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ - Product |
13 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions. |
21 Nov 2024, 08:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/02/27/4 - | |
References | () https://lists.apache.org/thread/rxkwbkh9vgbl9rzx1fkllyk3krhgydko - | |
References | () https://postfix.org/smtp-smuggling.html - | |
References | () https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ - |
13 Nov 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
CWE | CWE-290 CWE-444 |
27 Feb 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Feb 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-27 14:15
Updated : 2025-05-05 21:02
NVD link : CVE-2023-51747
Mitre link : CVE-2023-51747
CVE.ORG link : CVE-2023-51747
JSON object : View
Products Affected
apache
- james