hacktricks/emails-vulns.md

2.6 KiB
Raw Blame History

Emails Vulnerabilities

Payloads

Ignored parts of an email

The symbols: +, - and **{} **in rare occasions can be used for tagging and ignored by most e-mail servers

**Comments between parentheses () **at the beginning or the end will also be ignored

Whitelist bypass

  • inti(;inti@inti.io;)@whitelisted.com
  • inti@inti.io(@whitelisted.com)
  • inti+(@whitelisted.com;)@inti.io

IPs

You can also use IPs as domain named between square brackets:

  • john.doe@[127.0.0.1]
  • john.doe@[IPv6:2001:db8::1]

Other vulns

Third party SSO

XSS

Some services like **github **or salesforce allows you to create an email address with XSS payloads on it. If you can use this providers to login on other services and this services aren't sanitising correctly the email, you could cause XSS.

Account-Takeover

If a SSO service allows you to create an account without verifying the given email address (like salesforce) and then you can use that account to login in a different service that **trusts **salesforce, you could access any account.
Note that salesforce indicates if the given email was or not verified but so the application should take into account this info.

Reply-To

You can send an email using From: company.com** **and _**Replay-To: attacker.com **_and if any **automatic reply **is sent due to the email was sent **from **an **internal address **the **attacker **may be able to **receive **that response.

References

Hard Bounce Rate

Some applications like AWS have a Hard Bounce Rate (in AWS is 10%), that whenever is overloaded the email service is blocked.

A hard bounce is an email that couldnt be delivered for some permanent reasons. Maybe the emails a fake address, maybe the email domain isnt a real domain, or maybe the email recipients server wont accept emails) , that means from total of 1000 emails if 100 of them were fake or were invalid that caused all of them to bounce, **AWS SES **will block your service.

So, if you are able to send mails (maybe invitations) from the web application to any email address, you could provoke this block by sending hundreds of invitations to nonexistent users and domains: Email service DoS.