Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message.
This can be exploited by an attacker to add unintended headers to MIME messages.
Metrics
Affected Vendors & Products
References
History
Fri, 14 Feb 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache james Mime4j |
|
Weaknesses | CWE-74 | |
CPEs | cpe:2.3:a:apache:james_mime4j:*:*:*:*:*:*:*:* | |
Vendors & Products |
Apache
Apache james Mime4j |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 13 Feb 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message. This can be exploited by an attacker to add unintended headers to MIME messages. | Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message. This can be exploited by an attacker to add unintended headers to MIME messages. |

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T17:33:18.080Z
Reserved: 2024-01-02T06:51:12.024Z
Link: CVE-2024-21742

Updated: 2024-08-01T22:27:36.169Z

Status : Analyzed
Published: 2024-02-27T17:15:12.030
Modified: 2025-02-14T15:27:18.527
Link: CVE-2024-21742
