org.apache.james:james-server-protocols-smtp@3.4.0 vulnerabilities

  • latest version

    3.8.1

  • latest non vulnerable version

  • first published

    12 years ago

  • latest version published

    11 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.james:james-server-protocols-smtp package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Improper Input Validation

    Affected versions of this package are vulnerable to Improper Input Validation due to lenient behavior in line delimiter handling, which might create a difference of interpretation between the sender and the receiver. An attacker can forge an SMTP envelope, allowing, for instance, to bypass SPF checks by exploiting the enforcement of CRLF as a line delimiter as part of the DATA transaction.

    How to fix Improper Input Validation?

    Upgrade org.apache.james:james-server-protocols-smtp to version 3.7.5, 3.8.1 or higher.

    [,3.7.5)[3.8.0,3.8.1)