*Hi There Team,*
*Hope you are doing well,*

Kindly update me regarding this vulnerability and I am hoping for a bug
bounty from you for sending this vulnerability ethically to you.

*Best,*

On Sat, Jun 10, 2023 at 12:37 AM Muhammad Umar <jinmayhem.resea...@gmail.com>
wrote:

> I am a security researcher and I have found this vulnerability on your
> website https://www.haproxy.org/ .
>
> Description :
>
> This report is about a misconfigured spf record flag , which can be used
> to abuse the organization by posing the identity , which allows for fake
> mailing on behalf of respected organizations .
>
> About the Issue :
>
> as i seen the SPF and TXT record for the haproxy.org which is :
>
> v=spf1 mx ~all
>
>
> as u can see the symbol at last which Tilde (~all) is the issue , which
> should be replaced by Hyphen (-all) symbol .
>
> so valid record will be look like :
>
> v=spf1 mx -all
>
> What's the issue :
>
> As you can see in the article difference between Softmail and fail you
> should be using fail as Softmail allows anyone to send spoofed emails from
> your domains.
>
> In the current SPF record you should replace ~ with - at last before all ,
> - is strict which prevents all spoofed emails except if you are sending .
>
> Attack Scenario :
>
> an attacker will send phishing mail or anything malicious mail to the
> victim via mail :  haproxy@formilux.org  , even if the victim is aware of
> a phishing attack , he will check the Origin email which will be
> haproxy@formilux.org  , so he will be sure that its not fake mail and get
> trapped by attacker !
>
> This can be done using any php mailer tool like this ,
>
> <?php
>
> $to = "vic...@example.com";
>
> $subject = "Password Change";
>
> $txt = "Change your password by visiting here - [VIRUS LINK HERE]l";
>
> $headers = "From:  haproxy@formilux.org ";
>
> mail($to,$subject,$txt,$headers);
>
> ?>
>
> *Regards,*
> *Muhammad Umar*
> [image: image.png][image: image.png]
>
>
>

Reply via email to