NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Attack Parameters
Impact Assessment
CVSS Vector v4.0
Weakness Type (CWE)
Vulnerable Products 19
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r32:p1:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r32:p2:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r32:p3:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r32:p4:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r33:*:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r33:p1:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r33:p2:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r33:p3:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r34:*:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r34:p1:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r34:p2:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r35:*:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r35:p1:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r36:*:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r36:p1:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Plus
cpe:2.3:a:f5:nginx_plus:r36:p2:*:*:*:*:*:*
|
— | — |
|
F5 Nginx_Open_Source
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
|
0.6.27
|
<= 0.9.7
|
|
F5 Nginx_Open_Source
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
|
1.0.0
|
1.28.3
|
|
F5 Nginx_Open_Source
cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*
|
1.29.0
|
1.29.7
|