Phishing or What?? How I Got Access to the Internal Email of a Company

4 months ago 70
BOOK THIS SPACE FOR AD
ARTICLE AD

whit3ros3

Introduction

Hey guys, good to have you back on my blog. This is a bug that I found last September, but this vulnerability was a different one. Though not a very severe one, as it was marked as low, believe me, it was a very interesting one as I had a lot of fun after discovering this bug.

So in this vulnerability I was able to send emails to anyone in the world with a real, valid internal email of an ecommerce company. This was a fun experience and I just wanted to share with you all, about this easy to find but interesting bug.

Tip of the blog : Make notes

I’ve adopted a new technique that’s really paying off, and I’d like to share it with you all. What I do is grab a sticky note, place it beside my trackpad, and use it to jot down important points while testing a website.

my sticky note at that time

Let’s get started

So, another day, another bug, another story!!!

Once again, I found myself testing an e-commerce site, which I’ll refer to as “redacted.com”.
Learning from my past newbie’s experience, I made sure to explore all the functionalities the site had to offer and also noted down all those that appeared potentially vulnerable, with the intention of testing them further later on. These included the admin login page, user profiles, the contact us form, and even the supplier portal.

Rediscovering the ‘Contact Us’ Form

After not being able to find any bugs for like few hours, I went back to my notes to review what I had tested and what I might have missed.
That’s when I noticed the ‘Contact Us’ form, which I had completely forgotten about.

So I decided to give it a shot and tested it. Just as I captured the request after filling in all the details, I noticed something out-of-the-box.
There were keys named “to”, “from”, “subject”, “html”!!!!

email request (left) & actual email (right)

And yes you guessed it right, I could change their values, and a check was only applied on the “from” param.
So now, I could mail anything to anyone from a mail that belongs to the company I was testing.

Felt like Elliot

And the most interesting thing was that in the “html” all the html tags were working, so I was able to customize the email body however I want, can add links, icons, buttons, anything at all.
So I copy pasted the whole structure of what the real email from that company looks like and added malicious links to it.

Now, just imagine a scenario where you receive an email like this, but it’s from a hacker.

an actual email formed by me with phishing link embedded in download button

Fascinating but potentially dangerous!!!!!

I created a report and submitted it on HackerOne. After a few hours, I got a reply and the severity was downgraded to low. I had originally marked it as ‘High’, though.

I researched some more and learned about the service they were using to send emails. I discovered some new parameters, most of which were not that interesting, like “cc” and “bcc”. However, I found out that we could also add attachments to the emails.

I added a few more comments to the report, showing them all the possibilities with this vulnerability. In the end, this convinced them to raise the severity to ‘Medium’, which was good enough for me.

Fun Part

Now comes the most fun part of this experience. It felt like I had a lot of power in my hands, which I knew how to use, until the bug was resolved.😈😈😈.

I created a well-structured email, taking care of every minute detail. And this was the result!

a perfectly crafted email and sent via internal email of the company

Finding this vulnerability was worth my efforts, and I realized this when I sent the email to a friend of mine.😈😈😈

And to satisfy your curiosity about what was inside that assessment link, here is the link

See you in the next blog!😉😉

Read Entire Article