Family: CGI abuses --> Category: attack
Simple Form Mail Relaying via Subject Tags Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Checks for Mail Relaying via Subject Tags Vulnerability in Simple Form
Detailed Explanation for this Vulnerability Test
The target is running at least one instance of Simple Form which fails
to remove newlines from variables used to construct message headers.
A remote attacker can exploit this flaw to add to the list of
recipients, enabling him to use Simple Form on the target as a proxy
for sending abusive mail or spam.
See also : http://worldcommunity.com/opensource/utilities/simple_form.html
Solution : Upgrade to Simple Form 2.3 or later.
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.