ID CVE-2006-0631
Summary CRLF injection vulnerability in mailback.pl in Erik C. Thauvin mailback allows remote attackers to use mailback as a "spam proxy" by modifying mail headers, including recipient e-mail addresses, via newline characters in the Subject field.
References
Vulnerable Configurations
  • cpe:2.3:a:erik_c._thauvin:mailback:*:*:*:*:*:*:*:*
    cpe:2.3:a:erik_c._thauvin:mailback:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 20-07-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
bugtraq
  • 20060205 mailback script exploit
  • 20060210 Re: mailback script exploit
confirm http://vc.thauvin.net/cvs/cgi/mailback/mailback.pl?view=log
osvdb 22955
secunia 18748
vupen ADV-2006-0459
xf mailback-mail-relay(24540)
Last major update 20-07-2017 - 01:29
Published 10-02-2006 - 11:02
Last modified 20-07-2017 - 01:29
Back to Top