vendor:
Amavis-ng
by:
SecurityFocus
7.5
CVSS
HIGH
Bypass Relay Restriction
20
CWE
Product Name: Amavis-ng
Affected Version From: 0.1.6.x
Affected Version To: 0.1.6.x
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002
Amavis-ng Postfix Relay Restriction Bypass Vulnerability
It has been reported that some versions of Amavis-ng do not properly interact with Postfix. Because of this, an attacker may be able to circumvent relay restrictions. An attacker can connect to the Postfix SMTP server and issue a HELO command with the name of the Amavis-ng server. The attacker can then issue a MAIL FROM command with a valid user address and a RCPT TO command with an invalid user address. The attacker can then issue a DATA command and send an email to a valid user address. The email will be accepted and relayed by the Postfix server.
Mitigation:
Upgrade to the latest version of Amavis-ng.