Untitled

 avatar
unknown
plain_text
3 years ago
1.6 kB
5
Indexable
Hi Team,

This time I found this bug in your website designbombs.com

Vulnerability Type: No Valid SPF

Description:

I found out that there is no protection for your SMPT against email spoofing for the Following.   



info@designbombs.com


Proof of concept :   

image.png


Check here

--->> http://www.kitterman.com/spf/validate.html

As a result, An attacker would send a Fake email from support@YOURVULNERABLEDOMAINS.com 
The victim is aware of fake email attacks, But when he sees that the mail originated from support@VULNERABLEDOMAINS.com, He has no other way than to believe it. Clicking on the link takes him to a website where certain JavaScript is executed which steals his ABOVE VULNERABLEDOMAINS Sensitive Informations. 

TEST SCRIPT:

<?php
$to = "VICTIM@email.com";
$subject = "[URGENT] VULBERA WEB PASSWORD RESET LINK or Payment request";
$txt = "Click here! - [VIRUS LINK HERE]";
$headers = "From: attacker@VulnerableDOMAINabove.com";
mail($to,$subject,$txt,$headers);
?>

Impact

Case 1 :

we can Send a Fake Email Of Password Reset link where we can attach out fake page to extract the password of the Victim

Case 2 :

Fake Payment Request From Department Like if an attacker sends an email that he needs $500 or more For the Following work blah blah on the following PayPal or etc and send it To Admin 
Using Email like 
info@designbombs.com
so an admin or payment head will see that this email came from his own domain from their payment department and he can send it due to a trusted domain name. 

Thanks.

Sincerely,
John Lee
Editor is loading...