https://events.ccc.de/congress/2023/hub/en/event/smtp_smuggling_spoofing_e-mails_worldwide/
at least boo them for shitting the devs in the face right before holidays.
«SMTP Smuggling» is a vulnerability that allows to circumvent some mail checks at the receiver and therefore will allow additional spam and/or phishing messages through. Here is the list of what we currently know. Interested in the full story? I have written a German 🇩🇪 article on SMTP Smuggl
E-Mails, die E-Mails schmuggeln und so Phishing-Mails ermöglichen!? Kein Spaß für Postmaster kurz vor den Weihnachtsferien. - Wir zeigen, worum es eigentlich geht und was Admins und Postmaster jetzt tun können.
#SMTP #smuggling #Postfix #Mailserver #Postmaster #MTA #Spoofing #SMTPSmuggling #SECconsult
https://www.heinlein-support.de/blog/smtp-smuggling-aka-postmasters-weihnachtsstress
E-Mails, die E-Mails schmuggeln und so Phishing-Mails ermöglichen!? Kein Spaß für Postmaster kurz vor den Weihnachtsferien. - Wir zeigen, was Admins jetzt tun können.Wer ist Schuld an der ganzen Aufregung? Der CCC. Naja zumindest indirekt. Timo Longin von SEC Consult hat sich verschiedene MTA-Implementierungen angesehen und Unstimmigkeiten darin gefunden.
Some additional links:
The blog post describing the attack:
https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
Security advisory by #Postfix, clearly pissed:
https://www.postfix.org/smtp-smuggling.html
Some reactions from across the fedi:
https://zombofant.net/@jssfr/111618969359339789
https://gay-pirate-assassins.de/@moanos/statuses/01HJ8D8XQ7ZJ89HN4TZFZZ9AS8
https://waldvogel.family/@marcel/111622567290149119
As Timo clearly likes getting recognition for his work, I for one will be remembering his name, and the name of #SECConsult, his employer, for giving us this Christmas present. 💝
Thanks Timo. Now get off the fucking stage.
"🚨 Multiple Vulnerabilities Unveiled in SAP® Enable Now Manager 🚨"
SEC Consult has disclosed multiple vulnerabilities in SAP® Enable Now Manager, which could potentially allow a remote, unauthenticated attacker to create new administrative user accounts by exploiting a chain of vulnerabilities. The vulnerabilities include Open Redirect, Reflected Cross Site Scripting (XSS), and Insufficient Cross-Site Request Forgery (CSRF) Protection. The vendor has pushed a fix in the May 2023 Release for the Cloud Edition.
🔗 Source: Full Disclosure Mailing List
🔗 Advisory URL: SEC Consult
Tags: #SAP #Vulnerability #CyberSecurity #InfoSec #XSS #CSRF #OpenRedirect #SECConsult #CyberAttack #PatchUpdate 🌐🔐🔍
👥 Researchers: Paul Serban, Fabian Hagg from SEC Consult Vulnerability Lab (SEC Consult)