CVE-2024-27305

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-27305
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27305.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-27305
Aliases
Downstream
Related
Published
2024-03-12T20:29:54Z
Modified
2025-10-30T20:25:05.559434Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
SMTP smuggling in aiosmtpd
Details

aiosmtpd is a reimplementation of the Python stdlib smtpd.py based on asyncio. aiosmtpd is vulnerable to inbound SMTP smuggling. SMTP smuggling is a novel vulnerability based on not so novel interpretation differences of the SMTP protocol. By exploiting SMTP smuggling, an attacker may send smuggle/spoof e-mails with fake sender addresses, allowing advanced phishing attacks. This issue is also existed in other SMTP software like Postfix. With the right SMTP server constellation, an attacker can send spoofed e-mails to inbound/receiving aiosmtpd instances. This issue has been addressed in version 1.4.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-345"
    ]
}
References

Affected packages

Git / github.com/aio-libs/aiosmtpd

Affected ranges

Type
GIT
Repo
https://github.com/aio-libs/aiosmtpd
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0
1.0a1
1.0a2
1.0a3
1.0a4
1.0a5
1.0b1
1.0rc1
1.1
1.2
1.2-rc
1.2.1
1.2.2
1.2.3
1.2.4
1.3.0
1.3.0a2
1.3.0a3
1.3.1
1.3.2
1.4.0
1.4.1
1.4.2
1.4.3
1.4.3rc1
1.4.3rc2
1.4.4
1.4.4.post2