First published: Tue Feb 27 2024(Updated: )
Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message. This can be exploited by an attacker to add unintended headers to MIME messages.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.james:apache-mime4j-core | <0.8.10 | 0.8.10 |
Apache James | <=0.8.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21742 has been classified as a moderate severity vulnerability due to the potential for header injection.
To fix CVE-2024-21742, upgrade the Apache Mime4j library to version 0.8.10 or later.
The impact of CVE-2024-21742 includes the ability for attackers to manipulate MIME message headers, which could lead to unauthorized access or data leakage.
CVE-2024-21742 affects Apache Mime4j versions prior to 0.8.10 and Apache James Mime4j versions up to 0.8.9.
Any application using vulnerable versions of the Apache Mime4j library for message composition is at risk from CVE-2024-21742.