There is a workaround that addresses this vulnerability.
In setups that do not involve Network Address Translation (NAT), enabling the Host header protection feature would prevent exploitation of this vulnerability. The following example shows how to use the adminaccessconfig command, followed by the HOSTHEADER operation, to enable the Host header protection feature:
mail.example.com> adminaccessconfig
Choose the operation you want to perform: - BANNER - Configure login message (banner) for appliance administrator login. - WELCOME - Configure welcome message (post login message) for appliance administrator login. - IPACCESS - Configure IP-based access for appliance administrative interface. - CSRF - Configure web UI Cross-Site Request Forgeries protection. - XSS - Configure Cross-Site Scripting Attack protection. - HOSTHEADER - Configure option to use host header in HTTP requests. - TIMEOUT - Configure GUI and CLI session inactivity timeout. - MAXHTTPHEADERFIELDSIZE - Configure maximum HTTP header Field size. - HOW-TOS - Configure How-Tos feature. []> HOSTHEADER