{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-51747","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2023-12-22T16:12:33.074Z","datePublished":"2024-02-27T13:08:01.807Z","dateUpdated":"2025-02-13T17:19:50.944Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Apache James server","vendor":"Apache Software Foundation","versions":[{"lessThanOrEqual":"3.7.4","status":"affected","version":"0","versionType":"semver"},{"lessThanOrEqual":"3.8.0","status":"affected","version":"3.8","versionType":"semver"}]}],"credits":[{"lang":"en","type":"coordinator","value":"Benoit TELLIER"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling.<br><br>A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks.<br><br>The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction.<br><br>We recommend James users to upgrade to non vulnerable versions.<br>"}],"value":"Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling.\n\nA lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks.\n\nThe patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction.\n\nWe recommend James users to upgrade to non vulnerable versions."}],"metrics":[{"other":{"content":{"text":"important"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2024-02-27T13:10:07.890Z"},"references":[{"tags":["related"],"url":"https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"},{"tags":["related"],"url":"https://postfix.org/smtp-smuggling.html"},{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/rxkwbkh9vgbl9rzx1fkllyk3krhgydko"},{"url":"http://www.openwall.com/lists/oss-security/2024/02/27/4"}],"source":{"discovery":"UNKNOWN"},"title":"SMTP smuggling in Apache James","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-444","lang":"en","description":"CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-290","lang":"en","description":"CWE-290 Authentication Bypass by Spoofing"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.1,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"LOW","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-03-15T20:37:43.302258Z","id":"CVE-2023-51747","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-13T19:08:00.859Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T22:48:11.163Z"},"title":"CVE Program Container","references":[{"tags":["related","x_transferred"],"url":"https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"},{"tags":["related","x_transferred"],"url":"https://postfix.org/smtp-smuggling.html"},{"tags":["vendor-advisory","x_transferred"],"url":"https://lists.apache.org/thread/rxkwbkh9vgbl9rzx1fkllyk3krhgydko"},{"url":"http://www.openwall.com/lists/oss-security/2024/02/27/4","tags":["x_transferred"]}]}]}}