[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #26706 [Webpages/Website]: The Tor Website SMTP Open Relay - eugeni.torproject.org
#26706: The Tor Website SMTP Open Relay - eugeni.torproject.org
----------------------------------+--------------------
Reporter: t4rkd3vilz | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Webpages/Website | Version:
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
----------------------------------+--------------------
i’ve found an SMTP open relay vulnerability in 94.130.28.202
the vulnerability allows allatckers to send internal emails remotly
without any authintication.
And i’ve provided a screenshot as a POC for this exploitation methodolgy
eugeni.torproject.org
vuln name : SMTP open relaay
root@kali:~# telnet 94.130.28.202 25
Trying 94.130.28.202...
Connected to 94.130.28.202.
Escape character is '^]'.
220 eugeni.torproject.org ESMTP Postfix (Debian/GNU)
EHLO test
250-eugeni.torproject.org
250-PIPELINING
250-SIZE 10240000
250-ETRN
250-STARTTLS
250-ENHANCEDSTATUSCODES
250-8BITMIME
250 DSN
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26706>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs