CVE-2021-44549
SMTPS server hostname not checked when making TLS connection to SMTPS server
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Apache Sling Commons Messaging Mail provides a simple layer on top of JavaMail/Jakarta Mail for OSGi to send mails via SMTPS. To reduce the risk of "man in the middle" attacks additional server identity checks must be performed when accessing mail servers. For compatibility reasons these additional checks are disabled by default in JavaMail/Jakarta Mail. The SimpleMailService in Apache Sling Commons Messaging Mail 1.0 lacks an option to enable these checks for the shared mail session. A user could enable these checks nevertheless by accessing the session via the message created by SimpleMessageBuilder and setting the property mail.smtps.ssl.checkserveridentity to true. Apache Sling Commons Messaging Mail 2.0 adds support for enabling server identity checks and these checks are enabled by default. - https://javaee.github.io/javamail/docs/SSLNOTES.txt - https://javaee.github.io/javamail/docs/api/com/sun/mail/smtp/package-summary.html - https://github.com/eclipse-ee4j/mail/issues/429
Apache Sling Commons Messaging Mail proporciona una capa sencilla sobre JavaMail/Jakarta Mail para OSGi para enviar correos por medio de SMTPS. Para reducir el riesgo de ataques de tipo "man in the middle" deben realizarse comprobaciones adicionales de la identidad del servidor cuando accede a los servidores de correo. Por razones de compatibilidad, estas comprobaciones adicionales están deshabilitadas por defecto en JavaMail/Jakarta Mail. El SimpleMailService de Apache Sling Commons Messaging Mail versión 1.0 carece de una opción para habilitar estas comprobaciones para la sesión de correo compartido. Sin embargo, un usuario podría habilitar estas comprobaciones accediendo a la sesión por medio del mensaje creado por SimpleMessageBuilder y estableciendo la propiedad mail.smtps.ssl.checkserveridentity a true. Apache Sling Commons Messaging Mail versión 2.0 añade soporte para habilitar las comprobaciones de identidad del servidor y estas comprobaciones están habilitadas por defecto. - https://javaee.github.io/javamail/docs/SSLNOTES.txt - https://javaee.github.io/javamail/docs/api/com/sun/mail/smtp/package-summary.html - https://github.com/eclipse-ee4j/mail/issues/429
A vulnerability was found in Apache Sling Commons Messaging Mail(angus-mail), which provides a simple interface for sending emails via SMTPS in OSGi, does not offer an option to enable server identity checks, leaving connections vulnerable to "man-in-the-middle" attacks and can allow insecure email communication.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-12-04 CVE Reserved
- 2021-12-14 CVE Published
- 2024-08-04 CVE Updated
- 2024-11-05 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-295: Improper Certificate Validation
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://lists.apache.org/thread/l8p9h2bqvkj6rhv4w8kzctb817415b7f | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2021-44549 | 2024-11-05 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2315808 | 2024-11-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Sling Commons Messaging Mail Search vendor "Apache" for product "Sling Commons Messaging Mail" | 1.0.0 Search vendor "Apache" for product "Sling Commons Messaging Mail" and version "1.0.0" | - |
Affected
|