[] NeoSense

cPanel 5/6 / Formail-Clone - E-Mail Restriction Bypass

Author: Chad C. Keep
type: webapps
platform: php
port: 
date_added: 2003-05-30 
date_updated: 2012-11-14 
verified: 1 
codes: OSVDB-4222 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/7758/info

It has been reported that cPanel is prone to an issue where a remote attacker may bypass cPanel Formail-clone local domain checks and have untrusted e-mail delivered in the context of the vulnerable host.

This issue may be exploited by an attacker to use the vulnerable host as an open relay.

<input type="hidden" name="recipient"
value="user1@offsitedomain.(localdomain)co
m, user2@offsitedomain.(localdomain)com">