Description
courier/1000@/api_error_email.html (aka "error reporting page") in Accellion File Transfer Appliance FTA_7_0_178, and possibly other versions before FTA_7_0_189, allows remote attackers to send spam e-mail via modified description and client_email parameters.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Eric Beaulieu · textremotemultiple
https://www.exploit-db.com/exploits/32382
References (6)
Core 6
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/31178
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id?1020870
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/48242
Exploit x_refsource_misc
http://zebux.free.fr/pub/Advisory/Advisory_Accellion_SPAM_Engine_Vulnerability_200808.txt
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/31848
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/45159
Scores
EPSS
0.0459
EPSS Percentile
89.3%
Details
Status
published
Products (2)
accellion/secure_file_transfer_appliance
7_0_135
accellion/secure_file_transfer_appliance
< 7_0_178
Published
Aug 19, 2009
Tracked Since
Feb 18, 2026