cve-2016-4868
Vulnerability from cvelistv5
Published
2017-04-17 15:00
Modified
2024-08-06 00:46
Severity
Summary
Email header injection vulnerability in Cybozu Office 9.0.0 to 10.4.0 allows remote attackers to inject arbitrary email headers to send unintended emails via specially crafted requests.
Impacted products
VendorProduct
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T00:46:38.547Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.cybozu.com/ja-jp/article/9433"
          },
          {
            "name": "97713",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/97713"
          },
          {
            "name": "JVN#08736331",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN08736331/index.html"
          },
          {
            "name": "JVNDB-2016-000190",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000190.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-10-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Email header injection vulnerability in Cybozu Office 9.0.0 to 10.4.0 allows remote attackers to inject arbitrary email headers to send unintended emails via specially crafted requests."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-05-22T15:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.cybozu.com/ja-jp/article/9433"
        },
        {
          "name": "97713",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/97713"
        },
        {
          "name": "JVN#08736331",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN08736331/index.html"
        },
        {
          "name": "JVNDB-2016-000190",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000190.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-4868",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Email header injection vulnerability in Cybozu Office 9.0.0 to 10.4.0 allows remote attackers to inject arbitrary email headers to send unintended emails via specially crafted requests."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.cybozu.com/ja-jp/article/9433",
              "refsource": "CONFIRM",
              "url": "https://support.cybozu.com/ja-jp/article/9433"
            },
            {
              "name": "97713",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/97713"
            },
            {
              "name": "JVN#08736331",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN08736331/index.html"
            },
            {
              "name": "JVNDB-2016-000190",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000190.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-4868",
    "datePublished": "2017-04-17T15:00:00",
    "dateReserved": "2016-05-17T00:00:00",
    "dateUpdated": "2024-08-06T00:46:38.547Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2016-4868\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2017-04-17T15:59:00.277\",\"lastModified\":\"2017-05-23T01:29:02.083\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Email header injection vulnerability in Cybozu Office 9.0.0 to 10.4.0 allows remote attackers to inject arbitrary email headers to send unintended emails via specially crafted requests.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de la inyecci\u00f3n de encabezado de correo electr\u00f3nico en Cybozu Office versiones 9.0.0 hasta 10.4.0, permite a los atacantes remotos inyectar encabezados de correo electr\u00f3nico arbitrarios para enviar correos electr\u00f3nicos no previstos por medio de peticiones especialmente dise\u00f1adas.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B029709C-5ED7-4F29-8DA9-AFF9D678429F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:9.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9AE0F63-8DD1-4F61-B772-E4F64197A73F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:9.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E1F1BC-4FF8-4438-92C2-5094F18BAB27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:9.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C71A2292-BEEF-4449-992C-B8535E0EF969\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:9.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4B07F75-4F29-4241-9C5A-F723EAFCFC49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ADEDCD4-8794-42A3-961A-9CE562BF64CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CF1B981-0417-430F-9BB3-7292D297557E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:9.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59BDE89C-C891-4517-877D-26B5E4D87E0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:10.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F02CF334-548D-4B9B-8732-A85D97E003C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A968E493-5C74-45FB-BA4E-C21D66613480\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:10.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89D06E58-28D5-43E9-87CD-9534DF3CA6DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:10.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A86DD19B-9DD2-412D-B259-9D2677C9CC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:10.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EE0A58F-3DAF-4E88-A7CC-E1FE749EB6A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:10.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BF85C6A-952B-4327-98EF-BB72CA6AA5CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:10.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"664B383F-3C96-406C-B0B9-041F26F1F5A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cybozu:office:10.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBA465B8-3852-4630-B16C-120F77DB1F8C\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN08736331/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000190.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/97713\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://support.cybozu.com/ja-jp/article/9433\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...