cgiemail allows remote attackers to use cgiemail as a spam proxy via CRLF injection of encoded newline (%0a) characters in parameters such as required-subject, which can be used to modify the CC, BCC, and other header fields in the generated email message.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cgiemail | Mit | 1.6 (including) | 1.6 (including) |