当前位置:网站首页>Email giant exposes serious vulnerability, user data is stolen
Email giant exposes serious vulnerability, user data is stolen
2022-06-22 08:20:00 【Internet Security Research Institute】
According to foreign media reports , Mail giant Zimbra Expose serious loopholes , Hackers can steal login information without authentication or user interaction , This means that hackers can log in to the user's mailbox without an account or password .

Zimbra Is an open source collaborative office suite, including WebMail, The calendar , Address book ,Web Document management and authoring . Its biggest feature is that it uses Ajax Technical imitation CS The style of desktop application software development is compatible with the client Firefox,Safari and IE browser . Its products are all over the world , In countries / The district government 、 organization 、 It is widely used in the financial and educational sectors .
The researchers found that , An attacker can attack vulnerable Zimbra The customization of the instance HTTP request , To override the known user name IMAP Route entry . When a real user logs in ,Zimbra Medium Nginx The agent will send all IMAP Traffic is forwarded to the attacker , Include plain text credentials .
Mail client ( Such as Thunderbird、Microsoft Outlook、macOS E-mail applications and smart phone e-mail applications ) Users are usually connected to their IMAP The credentials of the server are stored on disk , Therefore, an attacker can use this vulnerability to bypass the restriction , When the user has no interaction and does not understand Zimbra Instance to steal the credentials of any user .
The study found that , There are nearly 80% The data leakage is related to e-mail . If it is a government or enterprise email , It bears confidential documents 、 Important transmission tasks of key information , Then its security is even more important .
Email encryption , Protect mail data security
If the user's mail data is clear text ( unencrypted ) Send and receive , Then the attacker will steal all the mail data of the user . therefore , We need to encrypt the mail with high strength .
When sending e-mail over the Internet , Mail will be sent through unprotected communication channels , Transfer multiple servers to reach the recipient , therefore , Mail account 、 Both the password and the content itself can be intercepted . In order to better protect email security , The message needs to be encrypted .
Loopholes are everywhere , We need to take protective measures
Network technology 、 operating system 、 In fact, there are loopholes in the application software , This is why we often need to update . Although we can not eliminate the existence of loopholes , However, we can greatly reduce the risks brought by them through management and technical protection measures .
Mail attack , Or it will cause the enterprise to leak on a larger scale
Both the server and the email client are vulnerable to malware . Users are vulnerable to phishing or fake emails , Click to start the malicious program . When the email server is infected , The stability of the entire internal system will be threatened , So as to leak data or be hidden in the system by malicious software , Constantly stealing emails and more data .
边栏推荐
- 同态加密的基本概念
- JSON usage example
- 歪门邪道之解决首屏图片加载闪烁问题
- QT 控件增加双击事件
- Mt4/mql4 getting started to mastering EA tutorial lesson 8 - common functions of MQL language (VIII) - common time function
- Master data management system
- C语言实现往MySQL插入和读取图片
- Bee read write separation Usage Summary
- [Oracle database] mammy tutorial day13 date function
- C#实现语音朗读功能
猜你喜欢

steam教育文化传承的必要性

复杂科学在创客教学研究中的应用

Any to Any 实时变声的实现与落地丨RTC Dev Meetup

Five skills to be an outstanding cloud architect

Detailed explanation of the underlying principle of concurrent thread pool and source code analysis
On Fresnel phenomenon

Using KDJ metrics on MT4

Add, delete and modify easyUI data table

Learn data warehouse together - Zero

Qt 错误提示1: invalid use of incomplete type ‘***‘
随机推荐
Weekly recommended short video: what is the "computing world"?
Enumerations, custom types, and swaggerignore in swagger
Three characteristics of concurrency 2-orderliness
PostgreSQL common commands and SQL -- continuous update
golang中使用swagger遇到的一些问题
[Oracle database] mammy tutorial Day12 character function
0基础自学stm32(野火)——什么是寄存器?
面试突击59:一个表中可以有多个自增列吗?
Summary of sub database and sub table 1
I spring and autumn web Penetration Test Engineer (elementary) learning notes (Chapter 2)
Submit values of various inputs of the form
Why can't semaphores be used in interrupts and why can't interrupt context sleep
Mt4/mql4 getting started to proficient in foreign exchange EA automatic trading tutorial - identify the emergence of the new K line
JSON usage example
Introduction to bee's main functions and features
.net core 技术栈 网站收集
年度十强!赛宁网安再次入围《中国数字安全百强报告》
MySQL query database capacity
LVS Technology Practice
PostgreSQL source code (56) extensible type analysis expandedobject/expandedrecord