CVE-2018-1294

If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
apacheCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 52%
VendorProductVersion
apachecommons_email
1.0 ≤
𝑥
≤ 1.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
commons-email
sid
1.5-3
fixed
trixie
1.5-3
fixed
bookworm
1.5-3
fixed
bullseye
1.5-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
commons-email
cosmic
not-affected
bionic
not-affected
artful
dne
xenial
dne
trusty
dne