icon

We found results for “

CVE-2024-21742

Good to know:

icon
icon

Date: February 27, 2024

Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message. This can be exploited by an attacker to add unintended headers to MIME messages.

Language: Java

Severity Score

Severity Score

Weakness Type (CWE)

Improper Input Validation

CWE-20

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-74

Top Fix

icon

Upgrade Version

Upgrade to version existdb - 4.4.0;existdb - no_fix;vufind/vufind - dev-pullrequest_accessib_turn-my-account-menu-into-ul;vufind/vufind - v3.1;vufind/vufind - dev-legacy/mink-autoretry;vufind/vufind - dev-legacy/lbs4-daia;vufind/vufind - dev-release-5.0;io.syndesis.server:server-runtime:no_fix;io.syndesis.server:server-runtime:no_fix;io.syndesis.server:server-runtime:1.13.1;io.syndesis.server:server-runtime:no_fix;org.apache.camel:camel-example-restlet-jdbc:2.15.2;org.apache.camel:camel-example-restlet-jdbc:2.15.2;org.apache.camel:camel-example-restlet-jdbc:2.17.1;org.apache.camel:camel-example-restlet-jdbc:2.18.2;org.apache.camel:camel-example-restlet-jdbc:2.15.2;org.apache.camel:camel-example-restlet-jdbc:2.15.1;org.apache.camel:camel-example-restlet-jdbc:2.15.2;org.apache.camel:camel-example-restlet-jdbc:2.15.2;org.apache.camel:camel-example-restlet-jdbc:2.15.2;org.apache.camel:camel-example-restlet-jdbc:2.17.1;org.apache.camel:camel-example-restlet-jdbc:2.17.1;org.apache.camel:camel-example-restlet-jdbc:2.17.1;org.apache.camel:camel-example-restlet-jdbc:2.17.1;org.apache.camel:camel-example-restlet-jdbc:2.17.1;org.apache.camel:camel-example-restlet-jdbc:2.17.1;org.apache.camel:camel-example-restlet-jdbc:2.17.1;org.apache.camel:camel-example-restlet-jdbc:2.17.1;org.apache.camel:camel-example-restlet-jdbc:2.14.1;org.apache.camel:camel-example-restlet-jdbc:2.17.1;org.apache.camel:camel-example-restlet-jdbc:2.15.2;org.apache.camel:camel-example-restlet-jdbc:2.17.1;org.apache.camel:camel-example-restlet-jdbc:2.17.1;io.syndesis.meta:meta:1.13.1;io.syndesis.meta:meta:1.13.1;org.apache.james:apache-mime4j-core:0.8.10

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us