CVE-2019-17123
Severity CVSS v4.0:
Pending analysis
Type:
CWE-74
Injection
Publication date:
13/12/2019
Last modified:
21/07/2021
Description
The eGain Web Email API 11+ allows spoofed messages because the fromName and message fields (to /system/ws/v11/ss/email) are mishandled, as demonstrated by fromName header injection with a %0a or %0d character. (Also, the message parameter can have initial HTML comment characters.)
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:egain:mail:*:*:*:*:*:*:*:* | 11 (including) |
To consult the complete list of CPE names with products and versions, see this page