Vulnerability CVE-2019-17123


Published: 2019-12-13

Description:
The eGain Web Email API 11+ allows spoofed messages because the fromName and message fields (to /system/ws/v11/ss/email) are mishandled, as demonstrated by fromName header injection with a %0a or %0d character. (Also, the message parameter can have initial HTML comment characters.)

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Egain -> MAIL 

 References:
http://www.egain.com/products/email-management-software/
https://medium.com/maverislabs/cve-2019-17123-cbc946c99f8

Copyright 2024, cxsecurity.com

 

Back to Top