Arbitrary Code Injection Affecting node-nodemailer package, versions <6.4.17-3


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.54% (67th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-NODENODEMAILER-1315161
  • published30 Jun 2021
  • disclosed29 Jun 2021

Introduced: 29 Jun 2021

CVE-2021-23400  (opens in a new tab)
CWE-74  (opens in a new tab)

How to fix?

Upgrade Debian:unstable node-nodemailer to version 6.4.17-3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream node-nodemailer package and not the node-nodemailer package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.

CVSS Base Scores

version 3.1