CVE-2023-51747

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-51747
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-51747.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-51747
Aliases
Published
2024-02-27T14:15:27Z
Modified
2025-05-17T14:04:39.001296Z
Summary
[none]
Details

Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling.

A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks.

The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction.

We recommend James users to upgrade to non vulnerable versions.

References

Affected packages

Git / github.com/apache/james-project

Affected ranges

Type
GIT
Repo
https://github.com/apache/james-project
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected

Affected versions

Other

cassandra_migration_v1_to_v2

james-project-3.*

james-project-3.0-beta5
james-project-3.0.0
james-project-3.0.0-RC1
james-project-3.0.0-beta5
james-project-3.3.0
james-project-3.4.0
james-project-3.7.0
james-project-3.7.1
james-project-3.7.2
james-project-3.7.3
james-project-3.7.4
james-project-3.7.5
james-project-3.8.0
james-project-3.8.1

pre-3.*

pre-3.1.0