| Vulnerability Name: | CVE-2019-20790 (CCN-181979) | ||||||||||||
| Assigned: | 2019-08-02 | ||||||||||||
| Published: | 2019-08-02 | ||||||||||||
| Updated: | 2022-11-16 | ||||||||||||
| Summary: | OpenDMARC through 1.3.2 and 1.4.x, when used with pypolicyd-spf 2.0.2, allows attacks that bypass SPF and DMARC authentication in situations where the HELO field is inconsistent with the MAIL FROM field. | ||||||||||||
| CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.6 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
4.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:R)
| ||||||||||||
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
| Vulnerability Type: | CWE-290 | ||||||||||||
| Vulnerability Consequences: | Bypass Security | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2019-20790 Source: CCN Type: Launchpad Bug #1838816 pypolicyd-spf returns false result, which may be exploited by attackers Source: MISC Type: Exploit, Third Party Advisory https://bugs.launchpad.net/pypolicyd-spf/+bug/1838816 Source: XF Type: UNKNOWN opendmarc-cve201920790-sec-bypass(181979) Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-1ec3c5ed63 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-433e7d72ce Source: CCN Type: SourceForge opendmarc Project opendmarc Source: MISC Type: Exploit, Third Party Advisory https://sourceforge.net/p/opendmarc/tickets/235/ Source: MISC Type: Technical Description, Third Party Advisory https://www.usenix.org/system/files/sec20fall_chen-jianjun_prepub_0.pdf Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-20790 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||