First published: Wed Feb 11 2004(Updated: )
cgiemail allows remote attackers to use cgiemail as a spam proxy via CRLF injection of encoded newline (%0a) characters in parameters such as "required-subject," which can be used to modify the CC, BCC, and other header fields in the generated email message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mit Cgiemail | =1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1575 is classified as having moderate severity due to its potential exploitation for spam attacks.
To fix CVE-2002-1575, upgrade to a patched version of cgiemail that addresses the CRLF injection vulnerability.
CVE-2002-1575 affects cgiemail version 1.6.
Yes, CVE-2002-1575 can allow unauthorized users to send spam emails by exploiting email header manipulation.
CVE-2002-1575 is considered relatively easy to exploit due to its reliance on parameter manipulation.