Loading HuntDB...

SPF Records (SMTP protection not used)

Medium
M
MyCrypto
Submitted None
Reported by shantanu_kul

Vulnerability Details

Technical details and impact analysis

Violation of Secure Design Principles
Hello MyCrypto Team , I am checking your website and found something is missing in SPF record.I don't find you have applied strict SMTP policy to stop spoofed email sending from your domain. I would like to recommend you to read the following article : https://www.digitalocean.com/community/tutorials/how-to-use-an-spf-record-to-prevent-spoofing-improve-e-mail-reliability Problem description : The above article strictly guide us about difference between soft mail and fail. MyCrypto should use fail because Soft mail allows anyone to send spoofed emails from your domains. In your SPF record you should replace ~ with - at last before all , - is strict which prevents all spoofed emails except if you are sending. Your bug is that you are using ~ , you should use - FIX : Your SPF record : v=spf1 include:_spf.google.com ~all It should be : v=spf1 include:_spf.google.com -all Best Regards , Shantanu ## Impact An attacker can send a Fake email from [email protected] saying that Please change your password, The victim is aware or not of phishing attacks, But when he sees that the mail originated from [email protected] , then he can blindly believe on it. Clicking on the link takes him to a website where certain JavaScript is executed which steals his PayPal id and password (SESSION COOKIE). Later results are more harmful. <?php $to = "[email protected]"; $subject = "Password Change"; $txt = "Change your password by visiting here - [VIRUS LINK HERE]l"; $headers = "From: [email protected]"; mail($to,$subject,$txt,$headers); ?>

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Violation of Secure Design Principles