It is not vulnerable - except that you will get these annoying probes from
time to time :)

I have a blog on this top with lots of additional insight in the comments at
the bottom.

http://mkruger.cfwebtools.com/index.cfm?mode=alias&alias=email%20injection

This follow up references a function for handling the injections.

http://mkruger.cfwebtools.com/index.cfm/2006/2/5/email.injection.function

-Mark


-----Original Message-----
From: Ian Buzer [mailto:[EMAIL PROTECTED]
Sent: Sunday, February 19, 2006 2:18 AM
To: CF-Talk
Subject: cfmail - is it vulnerable?


Hello,

Just got a bunch of emails in my inbox this morning that had been sent from
a contact form on one of my web sites. They all contained content a bit like
this:

deeper
xxContent-Type: multipart/alternative;
boundary=e00c35d22e0dba33a15957f33286efe8
MIME-Version: 1.0
Subject: idee is that a
bcc: [EMAIL PROTECTED]

This is a multi-part message in MIME format.

--e00c35d22e0dba33a15957f33286efe8
xxContent-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit

v coorse, he thinks marredge is goin to change
--e00c35d22e0dba33a15957f33286efe8--

....

It looks like someone's trying to test to see if the form is vulnerable to
having headers injected into it. In fact, on one of the attempts, he did
manage to override the subject of the email.

Does anyone know if cfmail is vulnerable to this kind of thing? It looks
like it might be.

What's the best way of preventing it? Perhaps I'll have to start replacing
out any instances of "Content-Type" in any email form fields :(

Ian



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Message: http://www.houseoffusion.com/lists.cfm/link=i:4:232858
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

Reply via email to