ID CVE-2002-1575
Summary cgiemail allows remote attackers to use cgiemail as a spam proxy via CRLF injection of encoded newline (%0a) characters in parameters such as "required-subject," which can be used to modify the CC, BCC, and other header fields in the generated email message.
References
Vulnerable Configurations
  • cpe:2.3:a:mit:cgiemail:1.6:*:*:*:*:*:*:*
    cpe:2.3:a:mit:cgiemail:1.6:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 11-07-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
bid 5013
bugtraq
  • 20020614 Another cgiemail bug
  • 20031003 patch for vulnerability in cgiemail
debian DSA-437
xf cgiemail-open-mail-relay(9361)
Last major update 11-07-2017 - 01:29
Published 03-03-2004 - 05:00
Last modified 11-07-2017 - 01:29
Back to Top