CVE-2019-17123
13.12.2019, 18:15
The eGain Web Email API 11+ allows spoofed messages because the fromName and message fields (to /system/ws/v11/ss/email) are mishandled, as demonstrated by fromName header injection with a %0a or %0d character. (Also, the message parameter can have initial HTML comment characters.)
Vendor | Product | Version |
---|---|---|
egain | 11 ≤ |
𝑥
= Vulnerable software versions