• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • We are looking for U.S.-based freelancer or agency working with SEO or WordPress for a quick 30-min interviews to gather feedback on XOVI, a successful German SEO tool we’re looking to launch in the U.S.
    If you qualify and participate, you’ll receive a $30 Amazon gift card as a thank-you. Please apply here. Thanks for helping shape a better SEO product for agencies!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Forwarded to devs Security bug: SpamAssassin Mail Handler bypass

OscarJuan

New Pleskian
TITLE:
Security bug: SpamAssassin Mail Handler bypass
PRODUCT, VERSION, OPERATING SYSTEM, ARCHITECTURE:
Plesk Onyx 17.8.11 (any tested version really)
CentOS Linux release 7.5.1804 (Core)
x86_64
PROBLEM DESCRIPTION:
Anyone can send a mail bypassing spam filter if he don´t defines a mail FROM: (<>) in SMTP connection.​
STEPS TO REPRODUCE:
# telnet RemotePleskServer 25
ehlo localhost
mail FROM:<>
rcpt TO: <[email protected]>
data
from: [email protected]
Subject: Hi Plesk developer
You are fired!
.
quit​
ACTUAL RESULT:
Logs:
spamassassin[20535]: cannot get sender domain
spamassassin[20535]: Unable to intialize spamassassin mail handler
postfix-local[20534]: Error during 'spam' handler

Spam mail headers:
[-]​
EXPECTED RESULT:
logs:
spamassassin[28956]: Starting the spamassassin filter...
spamd[4891]: spamd: connection from localhost [::1]:58576 to port 783, fd 6
spamd[4891]: spamd: using default config for [email protected]: /var/qmail/mailnames/domain.com/user/.spamassassin/user_prefs
spamd[4891]: spamd: processing message (unknown) for [email protected]:30
spamd[4891]: spamd: clean message (6.6/7.0) for [email protected]:30 in 0.3 seconds, 717 bytes.
spamd[4891]: spamd: result: . 6 - FSL_HELO_NON_FQDN_1,HEADER_FROM_DIFFERENT_DOMAINS,HELO_LOCALHOST,MISSING_DATE,MISSING_HEADERS,MISSING_MID scantime=0.3,size=717,[email protected],uid=30,required_score=7.0,rhost=localhost,raddr=::1,rport=58576,mid=(unknown),autolearn=no autolearn_force=no

Spam mail headers:
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on XXXX.XXXXXX.com
X-Spam-Level: ******
X-Spam-Status: No, score=6.6 required=7.0 tests=FSL_HELO_NON_FQDN_1,
HEADER_FROM_DIFFERENT_DOMAINS,HELO_LOCALHOST,MISSING_DATE,MISSING_HEADERS,
MISSING_MID autolearn=no autolearn_force=no version=3.4.0​
ANY ADDITIONAL INFORMATION:
YOUR EXPECTATIONS FROM PLESK SERVICE TEAM:
Confirm bug
 
Last edited:
Thank you!
The bug was confirmed and submitted as PPPM-10819
 
You are welcome.

Spammers were exploiting this vulnerability against our servers and I digged for the way that they bypassed the spam filter.

Regards.
 
Back
Top