Email Spoofing - SPF record set to Neutral
None
G
GSA Bounty
Submitted None
Team Summary
Official summary from GSA Bounty
Some of our domains lack SPF and/or DMARC records. While this is something we improve where we can, it's a known issue, and quite low risk. So, we don't consider lack of SPF/DMARC on these domains to be valid security issues.
Actions:
Reported by
ramakanthk35
Vulnerability Details
Technical details and impact analysis
Hi,
Introduction:
There is a email spoofing vulnerability.Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Email spoofing is a tactic used in phishing and spam campaigns because people are more likely to open an email when they think it has been sent by a legitimate source. The goal of email spoofing is to get recipients to open, and possibly even respond to, a solicitation.
Steps to Reproduce:
1.goto http://www.kitterman.com/spf/validate.html
2.Enter domain name: cloud.gov and click spf record if any under "Does my domain already have an SPF record? What is it? Is it valid?"
3.The SPF record is observed as below
"Found v=spf1 record for cloud.gov:
v=spf1 include:spf.mandrillapp.com ?all "
which is set to neutral,Neutral-The SPF record specifies explicitly that nothing can be said about validity.
In addition to above checking,
I used https://emkei.cz/ and send a test mail using cloud.gov domain which was delivered successfully.This further confirms that the emails spoofed
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
Violation of Secure Design Principles