I asked Plesk support this same question about our servers, here is their answer received today:
Thank you for waiting, we've got an update from Security Team.
Indeed, Plesk servers are affected by this vulnerability.
Plesk ships own Postfix 3.5.x packages for RHEL<=8 (and its forks) and Ubuntu 18. For other OSes Postfix is installed from OS vendor repositories.
The vulnerability fix for packages shipped by us is expected next week. Release for other operating systems depend on OS vendors. We are also considering to include necessary configuration changes for fixed versions.
Until security fix is released please consider applying short-term workaround suggested by Postfix
SMTP Smuggling
- Connect to the server via SSH.
- Check Postfix version - first line of the output:
# postconf -d | grep mail_version
- Change the following directives by editing /etc/postfix/main.cf configuration file:
- With all Postfix versions:
smtpd_data_restrictions = reject_unauth_pipelining
smtpd_discard_ehlo_keywords = chunking, silent-discard
- Postfix 3.9, 3.8.1, 3.7.6, 3.6.10 and 3.5.20:
smtpd_forbid_unauth_pipelining = yes
smtpd_discard_ehlo_keywords = chunking, silent-discard