cgiemail allows remote malicious users to use cgiemail as a spam proxy via CRLF injection of encoded newline (%0a) characters in parameters such as "required-subject," which can be used to modify the CC, BCC, and other header fields in the generated email message.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mit cgiemail 1.6 |