aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd is vulnerable to inbound SMTP smuggling. SMTP smuggling is a novel vulnerability based on not so novel interpretation differences of the SMTP protocol. By exploiting SMTP smuggling, an attacker may send smuggle/spoof e-mails with fake sender addresses, allowing advanced phishing attacks. This issue is also existed in other SMTP software like Postfix. With the right SMTP server constellation, an attacker can send spoofed e-mails to inbound/receiving aiosmtpd instances. This issue has been addressed in version 1.4.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Jan 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Aio-libs
Aio-libs aiosmtpd |
|
CPEs | cpe:2.3:a:aio-libs:aiosmtpd:*:*:*:*:*:*:*:* | |
Vendors & Products |
Aio-libs
Aio-libs aiosmtpd |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T00:27:59.989Z
Reserved: 2024-02-22T18:08:38.875Z
Link: CVE-2024-27305

Updated: 2024-08-02T00:27:59.989Z

Status : Analyzed
Published: 2024-03-12T21:15:58.630
Modified: 2025-01-22T15:02:31.500
Link: CVE-2024-27305

No data.