SMTP Header Injection Affecting org.apache.commons:commons-email package, versions [,1.5)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.27% (68th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SMTP Header Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHECOMMONS-31458
  • published31 Aug 2017
  • disclosed31 Jul 2017
  • creditAdam Williams

Introduced: 31 Jul 2017

CVE-2017-9801  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade org.apache.commons:commons-email to version 1.5 or higher.

Overview

org.apache.commons:commons-email aims to provide a API for sending email.

Affected versions of the package are vulnerable to SMTP Header Injection. When a call-site passes a subject for an email that contains line-breaks in Apache Commons Email 1.0 through 1.4, the caller can add arbitrary SMTP headers.

CVSS Scores

version 3.1