CVE-2021-23400

The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nodemailer:nodemailer:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 05:51

Type Values Removed Values Added
CVSS v2 : 6.8
v3 : 8.8
v2 : 6.8
v3 : 6.3
References () https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f - Patch, Third Party Advisory () https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f - Patch, Third Party Advisory
References () https://github.com/nodemailer/nodemailer/issues/1289 - Third Party Advisory () https://github.com/nodemailer/nodemailer/issues/1289 - Third Party Advisory
References () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737 - Exploit, Patch, Third Party Advisory () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737 - Exploit, Patch, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415 - Exploit, Patch, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415 - Exploit, Patch, Third Party Advisory

Information

Published : 2021-06-29 12:15

Updated : 2024-11-21 05:51


NVD link : CVE-2021-23400

Mitre link : CVE-2021-23400

CVE.ORG link : CVE-2021-23400


JSON object : View

Products Affected

nodemailer

  • nodemailer
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')