SMPT Protection not used, I can hijack your email server.

Disclosed: 2015-08-13 13:36:19 By ashesh To blockio
Unknown
Vulnerability Details
Description Companies like Coinbase, Yahoo,Google,Facebook and even hackerone implemented a strict email security policy (combining SPF, DKIM, and DMARC) but I don't see taht from block.io , You should apply strict SMPT policy to stop spoofed email sending from your domain. POC is attached. Exploit scenario: An attacker would send a Fake email from [email protected] saying that Please change your password, The victim is aware of phishing attacks, But when he sees that the mail originated from [email protected] , He has no other way than to believe it. Clicking on the link takes him to a website where certain JavaScript is executed which steals his block.io id and password (SESSION COOKIE). The results can be more dangerous. Code to Exploit: <?php $to = "[email protected]"; $subject = "Password Change"; $txt = "Change your password by visiting here - [VIRUS LINK HERE]l"; $headers = "From: [email protected]"; mail($to,$subject,$txt,$headers); ?> You should do the fix (see the fix below) To prevent misunderstanding and to protect your users. FIX Replace `?all` with `-all` to prevent fake email. Your's record: `v=spf1 include:spf.mandrillapp.com ?all` It should be `v=spf1 include:spf.mandrillapp.com -all ` POC IS ATTACHED HERE: http://gyazo.com/1f753428abff659b3f83df625dc380bc OUTPUT: SPF record lookup and validation for: Block.io SPF records are published in DNS as TXT records. The TXT records found for your domain are: v=spf1 include:spf.mandrillapp.com ?all Checking to see if there is a valid SPF record. Found v=spf1 record for Block.io: v=spf1 include:spf.mandrillapp.com ?all <---------- this is your mistake
Actions
View on HackerOne
Report Stats
  • Report ID: 34112
  • State: Closed
  • Substate: resolved
  • Upvotes: 4
Share this report