• Please be aware: Kaspersky Anti-Virus has been deprecated
    With the upgrade to Plesk Obsidian 18.0.64, "Kaspersky Anti-Virus for Servers" will be automatically removed from the servers it is installed on. We recommend that you migrate to Sophos Anti-Virus for Servers.
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.
  • We’re working on enhancing the Monitoring feature in Plesk, and we could really use your expertise! If you’re open to sharing your experiences with server and website monitoring or providing feedback, we’d love to have a one-hour online meeting with you.

Forwarded to devs Security bug: SpamAssassin Mail Handler bypass

OscarJuan

New Pleskian
TITLE:
Security bug: SpamAssassin Mail Handler bypass
PRODUCT, VERSION, OPERATING SYSTEM, ARCHITECTURE:
Plesk Onyx 17.8.11 (any tested version really)
CentOS Linux release 7.5.1804 (Core)
x86_64
PROBLEM DESCRIPTION:
Anyone can send a mail bypassing spam filter if he don´t defines a mail FROM: (<>) in SMTP connection.​
STEPS TO REPRODUCE:
# telnet RemotePleskServer 25
ehlo localhost
mail FROM:<>
rcpt TO: <[email protected]>
data
from: [email protected]
Subject: Hi Plesk developer
You are fired!
.
quit​
ACTUAL RESULT:
Logs:
spamassassin[20535]: cannot get sender domain
spamassassin[20535]: Unable to intialize spamassassin mail handler
postfix-local[20534]: Error during 'spam' handler

Spam mail headers:
[-]​
EXPECTED RESULT:
logs:
spamassassin[28956]: Starting the spamassassin filter...
spamd[4891]: spamd: connection from localhost [::1]:58576 to port 783, fd 6
spamd[4891]: spamd: using default config for [email protected]: /var/qmail/mailnames/domain.com/user/.spamassassin/user_prefs
spamd[4891]: spamd: processing message (unknown) for [email protected]:30
spamd[4891]: spamd: clean message (6.6/7.0) for [email protected]:30 in 0.3 seconds, 717 bytes.
spamd[4891]: spamd: result: . 6 - FSL_HELO_NON_FQDN_1,HEADER_FROM_DIFFERENT_DOMAINS,HELO_LOCALHOST,MISSING_DATE,MISSING_HEADERS,MISSING_MID scantime=0.3,size=717,[email protected],uid=30,required_score=7.0,rhost=localhost,raddr=::1,rport=58576,mid=(unknown),autolearn=no autolearn_force=no

Spam mail headers:
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on XXXX.XXXXXX.com
X-Spam-Level: ******
X-Spam-Status: No, score=6.6 required=7.0 tests=FSL_HELO_NON_FQDN_1,
HEADER_FROM_DIFFERENT_DOMAINS,HELO_LOCALHOST,MISSING_DATE,MISSING_HEADERS,
MISSING_MID autolearn=no autolearn_force=no version=3.4.0​
ANY ADDITIONAL INFORMATION:
YOUR EXPECTATIONS FROM PLESK SERVICE TEAM:
Confirm bug
 
Last edited:
Thank you!
The bug was confirmed and submitted as PPPM-10819
 
You are welcome.

Spammers were exploiting this vulnerability against our servers and I digged for the way that they bypassed the spam filter.

Regards.
 
Back
Top