Insecure service configuration - SMTP
Description
The hosting server has an open port (SMTP 25) which allows attackers to send emails using the web server.
Impact
Send emails as anyone using the servers.
Recommendation
Close unused ports to prevent SMTP relay attacks.
Threat
Anonymous attacker from the Internet.
Expected Remediation Time
⌚ 30 minutes.
Score
Default score using CVSS 3.1. It may change depending on the context of the vulnerability.
Base
- Attack vector: N
- Attack complexity: L
- Privileges required: N
- User interaction: N
- Scope: U
- Confidentiality: N
- Integrity: L
- Availability: N
Temporal
- Exploit code madurity: X
- Remediation level: X
- Report confidence: X
Result
- Vector string: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:X/RL:X/RC:X
- Score:
- Base: 5.3
- Temporal: 5.3
- Severity:
- Base: Medium
- Temporal: Medium
Code Examples
Compliant code
The smtp ports are securely configured
host_server:
delivery_method: :smtp
smtp_settings:
enable_starttls_auto: true
address: "address"
port: 587
domain: "promotions_domain"
authentication: cipher_key
user_name: "appadmin"
time_delay: 24h
Non compliant code
There are unsafe smtp ports opened
host_server:
delivery_method: :smtp
smtp_settings:
enable_starttls_auto: true
address: "address"
port: 25
domain: "yourdomain"
authentication: plain
user_name: "appadmin"
Requirements
free trial
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.