The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415 | Exploit Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737 | Exploit Patch Third Party Advisory |
https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f | Patch Third Party Advisory |
https://github.com/nodemailer/nodemailer/issues/1289 | Third Party Advisory |
Configurations
Information
Published : 2021-06-29 05:15
Updated : 2021-07-06 11:48
NVD link : CVE-2021-23400
Mitre link : CVE-2021-23400
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
nodemailer
- nodemailer