Server Side Misconfiguration (EMAIL SPOOFING)
None
G
GSA Bounty
Submitted None
Actions:
Reported by
swag01
Vulnerability Details
Technical details and impact analysis
Hi team,
Bug Type: Server Security Misconfiguration > Mail Server Misconfiguration > Missing SPF on Email Domain
Weakness: Improper Authentication
Description:
i observe this when i send a email from [email protected] through http://emkei.cz/ to email [email protected] and after that i check my yahoo mail i recieved it so this is due to Server Security Misconfiguration And Mail Server Misconfiguration.
Steps to reproduce:
1) Open this url http://emkei.cz/
2)Type In ''From email'' field [email protected] or any one email of your website.
3) After That Send to the victim email like [email protected] in ''To'' field.
4) Write other details what you want and send it to victim email.
5) Victim will recieve an email from TTS.
Reccomendation:
If you dont Find an email in inbox please check the spam folder also.
Attack scenario:
This can be dangerous ,as attacker can send some fake details or money(cash) or bounty amount like 10,00000 to someone of your users,then your user will claim back for the details. It will cause reputation loss.
PROOF OF CONCEPT:
FOR PROOF OF CONCEPT YOU CAN SEE IN SCREEN SHOT WHICH I AM ATTACHING THAT BY YOUR COMPANY MAIL I AM ABLE TO SEND ANYONE EMAIL WHATEVER I WANT. I TESTED IT ON MY OWN ACCOUNT. PLEASE SEE THE SCREEN SHOT.
THANKS
BEST REGARDS:
HUSNAIN IQBAL
Report Details
Additional information and metadata
State
Closed
Substate
Not-Applicable
Submitted
Weakness
Improper Authentication - Generic