当前位置:网站首页>Email giant exposes serious vulnerability, user data is stolen
Email giant exposes serious vulnerability, user data is stolen
2022-06-22 08:20:00 【Internet Security Research Institute】
According to foreign media reports , Mail giant Zimbra Expose serious loopholes , Hackers can steal login information without authentication or user interaction , This means that hackers can log in to the user's mailbox without an account or password .

Zimbra Is an open source collaborative office suite, including WebMail, The calendar , Address book ,Web Document management and authoring . Its biggest feature is that it uses Ajax Technical imitation CS The style of desktop application software development is compatible with the client Firefox,Safari and IE browser . Its products are all over the world , In countries / The district government 、 organization 、 It is widely used in the financial and educational sectors .
The researchers found that , An attacker can attack vulnerable Zimbra The customization of the instance HTTP request , To override the known user name IMAP Route entry . When a real user logs in ,Zimbra Medium Nginx The agent will send all IMAP Traffic is forwarded to the attacker , Include plain text credentials .
Mail client ( Such as Thunderbird、Microsoft Outlook、macOS E-mail applications and smart phone e-mail applications ) Users are usually connected to their IMAP The credentials of the server are stored on disk , Therefore, an attacker can use this vulnerability to bypass the restriction , When the user has no interaction and does not understand Zimbra Instance to steal the credentials of any user .
The study found that , There are nearly 80% The data leakage is related to e-mail . If it is a government or enterprise email , It bears confidential documents 、 Important transmission tasks of key information , Then its security is even more important .
Email encryption , Protect mail data security
If the user's mail data is clear text ( unencrypted ) Send and receive , Then the attacker will steal all the mail data of the user . therefore , We need to encrypt the mail with high strength .
When sending e-mail over the Internet , Mail will be sent through unprotected communication channels , Transfer multiple servers to reach the recipient , therefore , Mail account 、 Both the password and the content itself can be intercepted . In order to better protect email security , The message needs to be encrypted .
Loopholes are everywhere , We need to take protective measures
Network technology 、 operating system 、 In fact, there are loopholes in the application software , This is why we often need to update . Although we can not eliminate the existence of loopholes , However, we can greatly reduce the risks brought by them through management and technical protection measures .
Mail attack , Or it will cause the enterprise to leak on a larger scale
Both the server and the email client are vulnerable to malware . Users are vulnerable to phishing or fake emails , Click to start the malicious program . When the email server is infected , The stability of the entire internal system will be threatened , So as to leak data or be hidden in the system by malicious software , Constantly stealing emails and more data .
边栏推荐
- . Net core technology stack website Collection
- 依图在实时音视频中语音处理的挑战丨RTC Dev Meetup
- Questions 1 to 100 of the national information security grade examination nisp level 1 question bank (1)
- Nisp online simulation question bank
- 第八章 Web项目测试(此章完结)
- Mt4/mql4 getting started to mastering EA tutorial lesson 8 - common functions of MQL language (VIII) - common time function
- How to design the dead shot, the best and eye-catching performance of the watch Vanguard
- C # read / write TXT file to listview
- PostgreSQL common commands and SQL -- continuous update
- 找出不是两个数组共有的元素
猜你喜欢

2022年CIO面临的七大挑战及应对方法

Mt4/mql4 getting started to proficient in foreign exchange EA automatic trading tutorial - special identification of the K line on the chart

0基础自学stm32(野火)——什么是寄存器?

Some mathematical operation functions in LabVIEW

Mt4/mql4 getting started to mastering EA tutorial lesson 5 - common functions of MQL language (V) - common functions of account information

并发线程池底层原理详解与源码分析

I spring and autumn web Penetration Test Engineer (elementary) learning notes (Chapter 2)

解读创客教育中的技术一族

Add, delete and modify easyUI data table

并发三大特性1-可见性
随机推荐
C# 接口持有结构体会导致装箱问题
计算天数()
Example of QT combox
Note pad replaces all contents after a character in all lines
.net core 技术栈 网站收集
Why can't semaphores be used in interrupts and why can't interrupt context sleep
C language implements inserting and reading pictures into MySQL
Interview shock 59: can there be multiple auto increment columns in a table?
Qt 错误提示1: invalid use of incomplete type ‘***‘
成为一名卓越云架构师要具备的五项技能
. Net core technology stack website Collection
Mt4/mql4 getting started to proficient in foreign exchange EA automatic trading tutorial - identify the emergence of the new K line
QT error prompt 1:invalid use of incomplete type '***‘
安装 MySQL 服务时提示 InstallRemove of the Service Denied
Seven challenges faced by CIO in 2022 and Solutions
C#读写txt文件到listview
【Oracle 数据库】奶妈式教程 day11 数值函数
歪门邪道之解决首屏图片加载闪烁问题
Enumerations, custom types, and swaggerignore in swagger
I spring and autumn web Penetration Test Engineer (elementary) learning notes (Chapter 3)