CAPEC-134: Email Injection |
Description An adversary manipulates the headers and content of an email message by injecting data via the use of delimiter characters native to the protocol. Extended Description Many applications allow users to send email messages by filling in fields. For example, a web site may have a link to "share this site with a friend" where the user provides the recipient's email address and the web application fills out all the other fields, such as the subject and body. In this pattern, an adversary adds header and body information to an email message by injecting additional content in an input field used to construct a header of the mail message. This attack takes advantage of the fact that RFC 822 requires that headers in a mail message be separated by a carriage return. As a result, an adversary can inject new headers or content simply by adding a delimiting carriage return and then supplying the new heading and body information. This attack will not work if the user can only supply the message body since a carriage return in the body is treated as a normal character. Typical Severity Prerequisites
| The target application must allow the user to send email to some recipient, to specify the content at least one header field in the message, and must fail to sanitize against the injection of command separators. |
| The adversary must have the ability to access the target mail application. |
Resources Required
| None: No specialized resources are required to execute this type of attack. |
Taxonomy Mappings Relevant to the WASC taxonomy mapping | Entry ID | Entry Name |
|---|
| 30 | Mail Command Injection |
Content History | Submissions |
|---|
| Submission Date | Submitter | Organization |
|---|
| 2014-06-23 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | | | Modifications |
|---|
| Modification Date | Modifier | Organization |
|---|
| 2017-08-04 (Version 2.11) | CAPEC Content Team | The MITRE Corporation | | Updated Attack_Prerequisites, Related_Attack_Patterns, Resources_Required | | 2019-04-04 (Version 3.1) | CAPEC Content Team | The MITRE Corporation | | Updated Related_Weaknesses | | 2019-09-30 (Version 3.2) | CAPEC Content Team | The MITRE Corporation | | Updated Related_Attack_Patterns | | 2020-12-17 (Version 3.4) | CAPEC Content Team | The MITRE Corporation | | Updated Taxonomy_Mappings | | 2022-02-22 (Version 3.7) | CAPEC Content Team | The MITRE Corporation | | Updated Description, Extended_Description |
More information is available — Please select a different filter.
|