Vulnerability CVE-2002-1575


Published: 2004-03-03   Modified: 2012-02-12

Description:
cgiemail allows remote attackers to use cgiemail as a spam proxy via CRLF injection of encoded newline (%0a) characters in parameters such as "required-subject," which can be used to modify the CC, BCC, and other header fields in the generated email message.

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
MIT -> Cgiemail 

 References:
http://marc.info/?l=bugtraq&m=102406554627053&w=2
http://marc.info/?l=bugtraq&m=106520691705768&w=2
http://www.debian.org/security/2004/dsa-437
http://www.securityfocus.com/bid/5013
https://exchange.xforce.ibmcloud.com/vulnerabilities/9361

Copyright 2022, cxsecurity.com

 

Back to Top