Vulnerability: DMARC Quarantine/Reject policy not enabled (https://www.mozilla.org )
Categories
(Websites :: Other, task)
Tracking
(Not tracked)
People
(Reporter: ghazan1612, Unassigned)
References
()
Details
(Keywords: reporter-external, Whiteboard: [reporter-external] [web-bounty-form] [verif?])
Attachments
(1 file)
185.58 KB,
application/vnd.openxmlformats-officedocument.wordprocessingml.document
|
Details |
I just sent a forged email to my email address that appears to originate from “compliance@mozilla.com”. I was able to do this because of the following DMARC record:
DMARC record lookup and validation for: mozilla.com
"v=DMARC1; p=none; rua=mailto:dmarc@mozilla.com,mailto:dmarc_agg@vali.email"
Fix:
1)Enable DMARC Quarantine/Reject policy
2)Your DMARC record should look like
" v=DMARC1; p=reject; pct=100; ri=86400; rua=mailto:info@domain.com "
POC:
This can be done using any php mailer tool like this ,
<?php
$to = "VICTIM@example.com";
$subject = "Password Change";
$txt = "Change your password by visiting here - [VIRUS LINK HERE]l";
$headers = "From: compliance@mozilla.com ";
mail($to,$subject,$txt,$headers);
?>
You can check your DMARC record form here : https://mxtoolbox.com/DMARC.aspx
References:
Updated•4 years ago
|
Updated•10 months ago
|
Updated•9 months ago
|
Description
•