Summary | mailsploit vulnerability |
Queue | IMP |
Queue Version | 6.2.21 |
Type | Bug |
State | Unconfirmed |
Priority | 1. Low |
Owners | |
Requester | sca (at) andreasschulze (dot) de |
Created | 12/05/2017 (2717 days ago) |
Due | |
Updated | 12/06/2017 (2716 days ago) |
Assigned | |
Resolved | |
Milestone | |
Patch | No |
https://www.m3aawg.org/sites/default/files/m3aawg-unicode-best-practices-2016-02.pdf
State ⇒ Unconfirmed
Priority ⇒ 1. Low
Type ⇒ Bug
Summary ⇒ mailsploit vulnerability
Queue ⇒ IMP
Milestone ⇒
Patch ⇒ No
New Attachment: mailsploit.png
Basically the attacker uses special characters inside encoded words to
spoof the sender:
From:
=?utf-8?b?cG90dXNAd2hpdGVob3VzZS5nb3Y=?==?utf-8?Q?=00?==?utf-8?b?cG90dXNAd2hpdGVob3VzZS5nb3Y=?=@mailsploit.com
Such header naively decoded incorrectly is:
potus@whitehouse.gov\0potus@whitehouse.gov@mailsploit.com
IMP fail to decode / parse the RFC5322.From Header correctly