mailback script exploit

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



There is a mailback perl cgi script that has been in use for years,
originally written by Erik C. Thauvin, which has some serious
sercurity holes in it. One that is currently being exploited is that
the contents of the subject pass to the script from the form are not
sanitized before being passed to the SMTP server.

Spammers are setting the subject to be their message, complete with
bcc list of addresses and it is passed to the server and accepted.
Phillip Moore
My advice is to not use any type of generic mailback script -- all
headers should come from hard-coded values in the script, not fields
passed from the form.

.cp


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux