Lucene search

K
redhatcveRedhat.comRH:CVE-2024-6923
HistoryAug 06, 2024 - 1:21 p.m.

CVE-2024-6923

2024-08-0613:21:15
redhat.com
access.redhat.com
3
medium severity
header injection
email module
serialization
mitigation
update

CVSS3

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

AI Score

5.4

Confidence

High

EPSS

0

Percentile

13.7%

A vulnerability was found in the email module that uses Python language. The email module doesn’t properly quote new lines in email headers. This flaw allows an attacker to inject email headers that could, among other possibilities, add hidden email destinations or inject content into the email, impacting data confidentiality and integrity.

Mitigation

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

CVSS3

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

AI Score

5.4

Confidence

High

EPSS

0

Percentile

13.7%