CVE-2018-1294

Severity CVSS v4.0:
Pending analysis
Type:
CWE-20 Input Validation
Publication date:
20/03/2018
Last modified:
07/03/2019

Description

If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String).

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:apache:commons_email:*:*:*:*:*:*:*:* 1.0 (including) 1.4 (including)


References to Advisories, Solutions, and Tools