Email Spoofing Vulnerability in eGain Web Email API 11+

Email Spoofing Vulnerability in eGain Web Email API 11+

CVE-2019-17123 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

The eGain Web Email API 11+ allows spoofed messages because the fromName and message fields (to /system/ws/v11/ss/email) are mishandled, as demonstrated by fromName header injection with a %0a or %0d character. (Also, the message parameter can have initial HTML comment characters.)

Learn more about our Web App Pen Testing.