back about the web site. This facility is usually implemented by interfacing with
SMTP conversation that the application server conducts with the mail server. If
an attacker can submit suitable crafted input that is not filtered or sanitized, he
may be able to inject arbitrary STMP commands into this conversation.
In most cases, the application will enable you to specify the contents of the
message and your own email address (which is inserted into the From field of
the resulting email). You may also be able to specify the subject of the message
and other details. Any relevant field that you control may be vulnerable to
SMTP injection.
SMTP injection vulnerabilities are often exploited by spammers who scan
the Internet for vulnerable mail forms and use these to generate large volumes
of nuisance email.
Do'stlaringiz bilan baham: