TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

SMTP Injection via recipient email addresses [pdf]

20 pointsby ogigover 9 years ago

3 comments

feldover 9 years ago
I found this paper a bit difficult to grasp due to the terminology being used. I kept thinking of completely different attack scenarios (communicating with port 25 directly, somehow MITM an SMTP session) and had to re-read it several times. It seems all we&#x27;re doing here is just bypassing validation used by common libraries behind email forms on websites. You attack by using malicious input (full spam email message) in the &quot;email address&quot; section of the sign-up form and it successfully lands in the MTA&#x27;s queue and sends out.<p>It wasn&#x27;t clear if this can be defeated simply by disabling pipelining? If so, that seems like a sane fix if you don&#x27;t feel you can trust your application.
aidosover 9 years ago
I actually saw this attack used in the wild just over 10 years ago – so I guess it&#x27;s one that spammers have long since been aware of.<p>In my case we had a server that was running Adobe Coldfusion suddenly start misbehaving itself. After digging around a little we discovered all the outgoing email. I can&#x27;t remember the exact form but it was something like a forgot password mechanism.<p>As described in the article the attackers were just exploiting the non-validation of the recipient so they could inject an smtp payload. I remember at the time thinking that it was a) clever of the hackers and b) sloppy of the entire pipeline to not be doing some sense checking.
lightlyusedover 9 years ago
I&#x27;m guessing that they didn&#x27;t test this on qmail because it is not vulnerable.
评论 #10748782 未加载