Severity
7.1HIGH
EPSS
0.2%
top 52.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 27

Description

Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:NExploitability: 2.8 | Impact: 4.2

Affected Packages3 packages

Mavenorg.apache.james:james-server3.8.03.8.1+1
NVDapache/james3.7.5, 3.8.1+1

🔴Vulnerability Details

3
OSV
SMTP smuggling in Apache James2024-02-27
GHSA
SMTP smuggling in Apache James2024-02-27
CVEList
SMTP smuggling in Apache James2024-02-27

📋Vendor Advisories

1
Red Hat
apache-james: SMTP smuggling2024-02-27
CVE-2023-51747 (HIGH CVSS 7.1) | Apache James prior to versions 3.8. | cvebase.io