
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2023-51765 affects sendmail through version 8.17.2, allowing SMTP smuggling in certain configurations. The vulnerability was discovered in June 2023 by Timo Longin of SEC Consult. Remote attackers can exploit interpretation differences in SMTP protocol to inject email messages with a spoofed MAIL FROM address, allowing bypass of SPF protection mechanisms. This occurs because sendmail supports the '.' character sequence but some other popular email servers do not (SEC Consult Blog).
The vulnerability exploits differences in how email servers interpret the SMTP end-of-data sequence. Specifically, some servers accept a line-feed-only terminator (' . ') while others require the standard carriage-return/line-feed sequence (' . '). This discrepancy allows attackers to smuggle additional SMTP commands within the message data. The vulnerability has a CVSS v3.1 base score of 5.3 (Medium) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N (NVD).
When exploited, this vulnerability allows attackers to bypass SPF protection mechanisms and inject spoofed emails that appear to originate from legitimate domains. The attack can be particularly effective when targeting systems that use different interpretations of SMTP protocol specifications, potentially enabling sophisticated phishing campaigns that pass standard email authentication checks (SEC Consult Blog).
The vulnerability is resolved in sendmail version 8.18 and later versions with 'o' in srvfeatures, which enforces strict CR LF . CR LF as the end-of-data sequence as required by RFCs. For systems that cannot immediately upgrade, administrators can configure the srvfeatures option to require strict end-of-data sequence handling (Openwall).
The disclosure process of this vulnerability generated significant discussion in the security community. Some criticism was directed at the disclosure process, as several affected open-source projects were not directly notified before public disclosure. The vulnerability was later ranked 3rd place in the Portswigger Top 10 web hacking techniques of 2023 (SEC Consult Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”