Hi Team,
I am an independent security researcher and I have found a bug in your website[website/domain]
The details of it are as follows:-
Description:
This report is about a misconfigured SPF record flag, which can be used for malicious purposes as it allows for fake mailing on behalf of respected organizations.
About the Issue:
As i seen the SPF and TXT record for
[website/domain]
which is:
DMARC Policy Not Enabled
As u can see that you Weak SPF record, as valid record should be like:-
DMARC policy enabled
What's the issue:
As u can see in the article below the difference between soft-mail and fail you should be using fail, as Soft-mail allows anyone to send spoofed emails from your domains.
Attack Scenario:
An attacker will send phishing mail or anything malicious mail to the victim via mail:
[website/domain email]
Even if the victim is aware of a phishing attack , he will check the origin email which came from your genuine mail id
[website/domain email]
so he will think that it is genuine mail and get trapped by the attacker.
The attack can be done using any PHP mailer tool like this:-
<?php
$to = "VICTIM@example.com";
$subject = "Password Change";
$txt = "Change your password by visiting here - [VIRUS LINK HERE]l";
$headers = "From:
[website/domain email]
";mail($to,$subject,$txt,$headers);
?>
U can also check your SPF record form:
[link to 3rd-party service-checking tool]
Reference:
[link to 3rd-party article lending 'authority' to the report]
Have a look at the digital ocean article for a better understanding!
Waiting for your reply.Regards,
[bug/beg bounty scammer]
.
[images included below captured from above linked tool, referencing the parent domain name, to lend 'authority' to the report]
[image of 'fake' email using locally changed "From" address]
Hey Team,
I'm a penetration tester and bug bounty hunter. I have discovered multiple vulnerabilities on your site. I've reported one of my findings so that you can review it, as well as fix this issue.
Please review the report below.
Vulnerability: Broken Authentication & Session Management
We have observed that when we change "password" from one browser in place of session expiration from another browser it just updates the password from another browser and the old session gets updated without being logged out. The flows goes like this:
Broken Authentication and Session Management > Failure to Invalidate Session > On Password Change
Steps:
1- Login from two browsers at a time [From Chrome browser and from Mozilla Firefox].
2- Change password in settings from chrome browser.
3- Now Check Mozilla Firefox.
4- Your Session got "updated" in place of expiration.
Same goes with when using two different computer systems.
1- Login from two computers at a time
2- Change password in settings from computer A.
3- Now Check computer B.
4- Your Session got "updated" in place of expiration.
Recommendations: If Session is Updating from one Browser/Computer so other should expire first to renew session after login.
If you require any additional information, please let me know. I'll be waiting to hear from your side regarding the report and bounty. I'll share my other findings as well, once I've heard back from you.
Regards,
[fake name]
From
Ali Azhar thewhitehat862@gmail.com
Subject
VULNERABILITY REPORT- DMARC RECORD MISSING.
Body
What Is DMARC:
There is an email spoofing vulnerability.Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Email spoofing is a tactic used in phishing and spam campaigns because people are more likely to open an email when they think it has been sent by a legitimate source. The goal of email spoofing is to get recipients to open, and possibly even respond to, a solicitation.
How To Reproduce:
1.GO TO- https :// mxtoolbox.com/
2.ENTER THE WEBSITE ( https://www.katsbits.com/ ).CLICK GO.
3.YOU WILL SEE THE FAULT (No DMARC Record found)
4.In the new page that loads change MXLookup to DMARCLookup
POC-ATTACHED IMAGE
POC
(https://www.katsbits.com/images/blog/dmarc-scam-image-1.png)
(https://www.katsbits.com/images/blog/dmarc-scam-image-2.png)
Spammers can forge the "From" address on email messages to make messages appear to come from someone in your domain. If spammers use your domain to send spam or junk email, your domain quality is negatively affected. People who get the forged emails can mark them as spam or junk, which can impact authentic messages sent from your domain.
[signature image]
From: Nishant Prajapati <prajapatinishant1810@gmail.com>
Subject: Urgent: Security Concerns Found in Your Application
Body: Hello,
I hope this message finds you well.
I have discovered several security vulnerabilities within your application that pose potential risks to user data and functionality. It is crucial to address these issues promptly to safeguard your users and maintain the integrity of your platform. Could you please advise on the best way to share detailed findings with your team for immediate action?
If your organization offers a Bug Bounty program, I would appreciate information on how to participate. If not, I am committed to collaborating with you to strengthen your digital security framework.
I look forward to your prompt response.
Best regards,
Nishant Prajapati
Another bug bounty scammer, this time with a LinkedIn profile (not shown) claiming to have found a domain vulnerability due to a missing DMARC record. The scam here is claiming a quarantine policy setting (intentionally set the way it is) as a missing DMARC record while including screenshots confirming the scams. In other words, someone knowledgeable of 'IT' and/or 'security' would know the difference, and what the report actually means.
Dear Team,
I hope this email finds you well.
I've attached a report detailing a security issue I discovered on your website. Please review it at your earliest convenience.
Thank you,
https :// webcybersol . com/
From: Ahmed Khan <ahmedkhan2225522@gmail.com>
Subject: Vulnerability Report-Broken Authentication
Body: Hey Team,
I'm a penetration tester and bug bounty hunter. I have discovered multiple vulnerabilities on your site. I've reported one of my findings so that you can review it, as well as fix this issue.
Please review the report below.
Vulnerability: Broken Authentication & Session Management
We have observed that when we change "password" from one browser in place of session expiration from another browser it just updates the password from another browser and the old session gets updated without being logged out. The flows goes like this:
Broken Authentication and Session Management > Failure to Invalidate Session > On Password Change
Steps:
1- Login from two browsers at a time [From Chrome browser and from Mozilla Firefox].
2- Change password in settings from chrome browser.
3- Now Check Mozilla Firefox.
4- Your Session got "updated" in place of expiration.
Same goes with when using two different computer systems.
1- Login from two computers at a time
2- Change password in settings from computer A.
3- Now Check computer B.
4- Your Session got "updated" in place of expiration.
Recommendations: If Session is Updating from one Browser/Computer so other should expire first to renew session after login.
If you require any additional information, please let me know. I'll be waiting to hear from your side regarding the report and bounty. I'll share my other findings as well, once I've heard back from you.
Regards,
Ahmed