CVE-2023-51747

Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:james:3.7.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:james:3.8.1:*:*:*:*:*:*:*

History

05 May 2025, 21:02

Type Values Removed Values Added
References () https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ - () https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/ - Product
References () https://lists.apache.org/thread/rxkwbkh9vgbl9rzx1fkllyk3krhgydko - () https://lists.apache.org/thread/rxkwbkh9vgbl9rzx1fkllyk3krhgydko - Mailing List, Vendor Advisory
References () https://postfix.org/smtp-smuggling.html - () https://postfix.org/smtp-smuggling.html - Product
References () http://www.openwall.com/lists/oss-security/2024/02/27/4 - () http://www.openwall.com/lists/oss-security/2024/02/27/4 - Mailing List, Third Party Advisory
First Time Apache james
Apache
CPE cpe:2.3:a:apache:james:3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:james:3.7.5:*:*:*:*:*:*:*

13 Feb 2025, 18:15

Type Values Removed Values Added
Summary Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions. Apache James prior to versions 3.8.1 and 3.7.5 is vulnerable to SMTP smuggling. A lenient behaviour in line delimiter handling might create a difference of interpretation between the sender and the receiver which can be exploited by an attacker to forge an SMTP envelop, allowing for instance to bypass SPF checks. The patch implies enforcement of CRLF as a line delimiter as part of the DATA transaction. We recommend James users to upgrade to non vulnerable versions.
CWE CWE-20

27 Feb 2024, 15:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/02/27/4 -

27 Feb 2024, 14:19

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 14:15

Updated : 2025-05-05 21:02


NVD link : CVE-2023-51747

Mitre link : CVE-2023-51747


JSON object : View

Products Affected

apache

  • james
CWE

No CWE.