V
vMike
http://www.anders.com/cms/75/Crack.Attempt/Spam.Relay
Here is a snip from the above link.
.... attacker is hoping to exploit unchecked fields in a "web to email" form.
The attack works by assuming a field used in an email header (such as the
"From:" address or the "Subject:") is passed unchecked to the mail
subsystem. Appending a newline character and a few more carefully crafted
header lines with a BCC list and a spam message body might trick the
underlying mail system into relaying spam for the attacker. An initial test
sending a BCC copy to (e-mail address removed) has been used on most forms
on my site to phish for vulnerable scripts. If you run a site, you should
check and strip fields for carriage return and newline characters used
directly in email headers.
...
I tested my forms and they seems to be finel, but was wondering if anyone
knows where asp.net is vulnerable to this atack.
I use SmtpMail.Send and I htmlencode all fields on the form.
Mike
Here is a snip from the above link.
.... attacker is hoping to exploit unchecked fields in a "web to email" form.
The attack works by assuming a field used in an email header (such as the
"From:" address or the "Subject:") is passed unchecked to the mail
subsystem. Appending a newline character and a few more carefully crafted
header lines with a BCC list and a spam message body might trick the
underlying mail system into relaying spam for the attacker. An initial test
sending a BCC copy to (e-mail address removed) has been used on most forms
on my site to phish for vulnerable scripts. If you run a site, you should
check and strip fields for carriage return and newline characters used
directly in email headers.
...
I tested my forms and they seems to be finel, but was wondering if anyone
knows where asp.net is vulnerable to this atack.
I use SmtpMail.Send and I htmlencode all fields on the form.
Mike