Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SMTP Smuggling: qpsmtpd seems to be not affected #317

Open
wornet-aer opened this issue Dec 28, 2023 · 0 comments · May be fixed by #318
Open

SMTP Smuggling: qpsmtpd seems to be not affected #317

wornet-aer opened this issue Dec 28, 2023 · 0 comments · May be fixed by #318

Comments

@wornet-aer
Copy link
Contributor

After reading about the current SMTP Smuggling issue, I was very curious, if qpsmtpd is also vulnerable.
So I tried to exploit this issue using smtpsmug.

Result:
qpsmtpd correctly handled all my exploit probes and returns 421 See http://smtpd.develooper.com/barelf.html or 451 Incomplete DATA.

However there is one case that may have room for improvement:
qpsmtpd currently also accepts \n.\r\n as end-of-data command, instead of \r\n.\r\n as specified in the RFC.

References:

@bseibold bseibold linked a pull request Dec 29, 2023 that will close this issue
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant