Vulnerabilities > CVE-2002-1575 - Unspecified vulnerability in MIT Cgiemail 1.6
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN mit
nessus
Summary
cgiemail allows remote attackers to use cgiemail as a spam proxy via CRLF injection of encoded newline (%0a) characters in parameters such as "required-subject," which can be used to modify the CC, BCC, and other header fields in the generated email message.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-437.NASL |
description | A vulnerability was discovered in cgiemail, a CGI program used to email the contents of an HTML form, whereby it could be used to send email to arbitrary addresses. This type of vulnerability is commonly exploited to send unsolicited commercial email (spam). |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15274 |
published | 2004-09-29 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15274 |
title | Debian DSA-437-1 : cgiemail - open mail relay |
code |
|
References
- http://marc.info/?l=bugtraq&m=102406554627053&w=2
- http://marc.info/?l=bugtraq&m=102406554627053&w=2
- http://marc.info/?l=bugtraq&m=106520691705768&w=2
- http://marc.info/?l=bugtraq&m=106520691705768&w=2
- http://www.debian.org/security/2004/dsa-437
- http://www.debian.org/security/2004/dsa-437
- http://www.securityfocus.com/bid/5013
- http://www.securityfocus.com/bid/5013
- https://exchange.xforce.ibmcloud.com/vulnerabilities/9361
- https://exchange.xforce.ibmcloud.com/vulnerabilities/9361