Hi There
 any update ?
 Thanks

On Fri, Mar 20, 2020 at 2:40 AM Atik Islam <atiki8...@gmail.com> wrote:

>
>
>
>  Hi,
> Severity : High.
> Introduction:
> There is a email spoofing vulnerability.Email spoofing is the forgery of
> an email header so that the message appears to have originated from someone
> or somewhere other than the actual source. Email spoofing is a tactic used
> in phishing and spam campaigns because people are more likely to open an
> email when they think it has been sent by a legitimate source. The goal of
> email spoofing is to get recipients to open, and possibly even respond to,
> a solicitation.
>
> Steps to Reproduce:
>
> 1.goto http://www.kitterman.com/spf/validate.html
> 2.Enter domain name: www.qemu.org and click spf record if any under "Does
> my domain already have an SPF record? What is it? Is it valid?"
> 3.You will see that no valid spf protection.
> 4.So that why i try to send email using qemu-discuss@nongnu.org and i was
> successfully delivered the messege to my email address.
>
> In addition to above checking,
>
> I used https://emkei.cz/ and send a test mail using www.qemu.orgdomain
> which was delivered successfully.This further confirms that the emails
> spoofed.
>
> Impact
> An attacker would send a Fake email. The results can be more dangerous.
>

Reply via email to