Bug 2266612 (CVE-2024-21742)

Summary: CVE-2024-21742 : Apache James Mime4J: Mime4J DOM header injection
Product: [Other] Security Response Reporter: Marco Benatto <mbenatto>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2266622    
Bug Blocks:    

Description Marco Benatto 2024-02-28 14:30:48 UTC
Improper input validation allows for header injection in MIME4J library when using MIME4J DOM for composing message.
This can be exploited by an attacker to add unintended headers to MIME messages.

https://lists.apache.org/thread/nrqzg93219wdj056pqfszsd33dc54kfy

Comment 1 Marco Benatto 2024-02-28 15:13:42 UTC
Created apache-james-project tracking bugs for this issue:

Affects: epel-all [bug 2266622]