| Summary | mailsploit vulnerability |
| Queue | IMP |
| Queue Version | 6.2.21 |
| Type | Bug |
| State | Unconfirmed |
| Priority | 1. Low |
| Owners | |
| Requester | sca (at) andreasschulze (dot) de |
| Created | 12/05/2017 (2879 days ago) |
| Due | |
| Updated | 12/06/2017 (2878 days ago) |
| Assigned | |
| Resolved | |
| Github Issue Link | |
| Github Pull Request | |
| Milestone | |
| Patch | No |
https://www.m3aawg.org/sites/default/files/m3aawg-unicode-best-practices-2016-02.pdf
State ⇒ Unconfirmed
Priority ⇒ 1. Low
Type ⇒ Bug
Summary ⇒ mailsploit vulnerability
Queue ⇒ IMP
Milestone ⇒
Patch ⇒ No
New Attachment: mailsploit.png
Basically the attacker uses special characters inside encoded words to
spoof the sender:
From:
=?utf-8?b?cG90dXNAd2hpdGVob3VzZS5nb3Y=?==?utf-8?Q?=00?==?utf-8?b?cG90dXNAd2hpdGVob3VzZS5nb3Y=?=@mailsploit.com
Such header naively decoded incorrectly is:
potus@whitehouse.gov\0potus@whitehouse.gov@mailsploit.com
IMP fail to decode / parse the RFC5322.From Header correctly