| Summary | mailsploit vulnerability | 
| Queue | IMP | 
| Queue Version | 6.2.21 | 
| Type | Bug | 
| State | Unconfirmed | 
| Priority | 1. Low | 
| Owners | |
| Requester | sca (at) andreasschulze (dot) de | 
| Created | 12/05/2017 (2887 days ago) | 
| Due | |
| Updated | 12/06/2017 (2886 days ago) | 
| Assigned | |
| Resolved | |
| Github Issue Link | |
| Github Pull Request | |
| Milestone | |
| Patch | No | 
https://www.m3aawg.org/sites/default/files/m3aawg-unicode-best-practices-2016-02.pdf
State ⇒ Unconfirmed
Priority ⇒ 1. Low
Type ⇒ Bug
Summary ⇒ mailsploit vulnerability
Queue ⇒ IMP
Milestone ⇒
Patch ⇒ No
New Attachment: mailsploit.png
Basically the attacker uses special characters inside encoded words to
spoof the sender:
From:
=?utf-8?b?cG90dXNAd2hpdGVob3VzZS5nb3Y=?==?utf-8?Q?=00?==?utf-8?b?cG90dXNAd2hpdGVob3VzZS5nb3Y=?=@mailsploit.com
Such header naively decoded incorrectly is:
potus@whitehouse.gov\0potus@whitehouse.gov@mailsploit.com
IMP fail to decode / parse the RFC5322.From Header correctly