Re: Simple Mail Server - SMTP Authentication Bypass Vulnerabilit

看板Bugtraq作者時間14年前 (2012/01/11 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
Hi, demonalex@163.com schrieb am 08.01.2012 um 15:10: > Title: Simple Mail Server - SMTP Authentication Bypass Vulnerability >=20 > Bug Description : > Simple Mail Server is a tiny Mail Server written in C#. It can be sen= t mail=20 without password by using usual tcp client(such as telnet). > And it did not have SMTP authentication contoller. >=20 > POC(Remarks: domain alex.com and user alex@alex.com must be exists in= =20 configuration for this test case): > >telnet 127.0.0.1 25 > 220 TEST-121F797342 SMTP ready. > EHLO mail_of_alert > 500 Not supported. Use HELO > MAIL FROM: <alex@alex.com> > 250 OK > RCPT TO: <alex@alex.com> > 250 OK > Data > 354 Start mail input; end with <CRLF>.<CRLF> > From: "alex@alex.com" <alex@alex.com> > To: "alex@alex.com" <alex@alex.com> > Subject: authenticate is not required! erm... where's the bug? If the mailer is configured to receive mail for alex@alex.com, why should it require SMTP authentication for incoming mails to that address? Anyway, SMTP authentication is not a requirement for an MTA, so the lack of such can hardly be called a bug. Bye, =09Peter --=20 Peter Conrad Tivano Software GmbH Bahnhofstr. 18 63263 Neu-Isenburg Tel: 06102 / 8099070 Fax: 06102 / 8099071 HRB 11680, AG Offenbach/Main Gesch=C3=A4ftsf=C3=BChrer: Martin Apel
文章代碼(AID): #1F37pZj6 (Bugtraq)