• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • We are looking for U.S.-based freelancer or agency working with SEO or WordPress for a quick 30-min interviews to gather feedback on XOVI, a successful German SEO tool we’re looking to launch in the U.S.
    If you qualify and participate, you’ll receive a $30 Amazon gift card as a thank-you. Please apply here. Thanks for helping shape a better SEO product for agencies!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Resolved Patch: Postfix - 37C3 - SMTP Smuggling – Spoofing E-Mails Worldwide

Jan Bludau

Basic Pleskian
Username:

TITLE

Patch: Postfix - 37C3 - SMTP Smuggling – Spoofing E-Mails Worldwide

PRODUCT, VERSION, OPERATING SYSTEM, ARCHITECTURE

Debian 12, Postfix

PROBLEM DESCRIPTION

SMTP smuggling is a new attack technique
SMTP smuggling is a new attack technique that allows attackers to send fake emails that can bypass authentication mechanisms and spam filters. This technique was discovered and published in December 2023 by security researchers from SEC Consult.

SMTP stands for Simple Mail Transfer Protocol and is a standard protocol for sending and receiving emails on the Internet. SMTP is based on communication between SMTP servers that forward the emails and SMTP clients that send or receive the emails. The emails are divided into individual messages, each containing a header and a body. The header contains information such as the sender, recipient, date and subject of the email. The body contains the actual content of the email.

To mark the end of a message, a special string consisting of a period (.) followed by a newline is used. This string is called the End-of-Message (EOM). However, different SMTP implementations interpret this string differently. Some SMTP servers accept only a newline (\n), others only accept a carriage return (\r), and others accept both (\r\n). This creates an inconsistency between the SMTP servers that route the emails.

SMTP Smuggling exploits this inconsistency by inserting a special string in the body of an email that consists of a period (\.) followed by a carriage return (\r). This string is called the End-of-Header (EOH). If an SMTP server interprets this string as EOM, it will truncate the email after this string and forward it to the next SMTP server. However, if the next SMTP server does not interpret this string as EOM, it will truncate the email after the next period (\.) and forward it to the next SMTP server.

In this way, a single email can be split into multiple emails, each with a different header. The attacker can manipulate the header to spoof the sender, bypass authentication mechanisms such as SPF, DKIM and DMARC, or remove warnings such as spam flags. This can lead to various social engineering or phishing attacks where the recipient believes they are receiving a legitimate email from a trusted source.

How to protect yourself from SMTP smuggling? One option is to configure SMTP servers to accept only a uniform string for the EOM (\r\n.\r\n) and reject all other variants. Another option is to configure SMTP clients so that they do not insert additional periods (\.) in the body of an email. Some large companies such as Microsoft and GMX have already secured their mail services against SMTP smuggling.

SMTP Smuggling is a new and dangerous attack technique that exploits the old and widely used SMTP protocol. It is important to educate yourself about this technology and take appropriate protective measures.

Patch: Postfix

37C3 - SMTP Smuggling – Spoofing E-Mails Worldwide

STEPS TO REPRODUCE

Version 18.0.57 Update #5,, installed
postfix3.7.9-0+deb12u1
Debian 12.4

ACTUAL RESULT

SMTP Smuggling possible

EXPECTED RESULT

SMTP Smuggling not possible

ANY ADDITIONAL INFORMATION

(DID NOT ANSWER QUESTION)

YOUR EXPECTATIONS FROM PLESK SERVICE TEAM

Confirm bug
 
Plesk for Linux ships Postfix 3.5.x (Redhat <= 8 and Ubuntu 18), the vulnerability fix is expected soon, the team is working on the fix. Other Plesk for Linux installations use system package.

All clients using Plesk for Linux can apply short-term the workaround from the article SMTP Smuggling.

It impacts some Postfix clients and addresses the issue only partially (covers only misuse of SMTP command pipelining). Long-term fix is advised. See https://www.postfix.org/smtp-smuggling.html#:~:text=across%20the%20Internet.-,Long%2Dterm%20fix,-A%20long%2Dterm.
 
Last edited:
Back
Top