A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks.
The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction.
We recommend James users to upgrade to non vulnerable versions.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0681 | Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions. |
Github GHSA |
GHSA-p5q9-86w4-2xr5 | SMTP smuggling in Apache James |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 28 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Mon, 05 May 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache james |
|
| CPEs | cpe:2.3:a:apache:james:3.7.5:*:*:*:*:*:*:* cpe:2.3:a:apache:james:3.8.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Apache
Apache james |
Thu, 13 Feb 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions. | Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions. |
Wed, 13 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-290 CWE-444 |
|
| Metrics |
cvssV3_1
|
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T17:19:50.944Z
Reserved: 2023-12-22T16:12:33.074Z
Link: CVE-2023-51747
Updated: 2024-08-02T22:48:11.163Z
Status : Analyzed
Published: 2024-02-27T14:15:27.030
Modified: 2025-05-05T21:02:14.223
Link: CVE-2023-51747
OpenCVE Enrichment
No data.
EUVD
Github GHSA