CVE Vulnerabilities

CVE-2020-12272

Authentication Bypass by Spoofing

Published: Apr 27, 2020 | Modified: Nov 07, 2023
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
LOW

OpenDMARC through 1.3.2 and 1.4.x allows attacks that inject authentication results to provide false information about the domain that originated an e-mail message. This is caused by incorrect parsing and interpretation of SPF/DKIM authentication results, as demonstrated by the example.net(.example.com substring.

Weakness

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.

Affected Software

Name Vendor Start Version End Version
Opendmarc Trusteddomain 1.0.0 (including) 1.3.2 (including)
Opendmarc Trusteddomain 1.4.0 (including) 1.4.0 (including)
Opendmarc Trusteddomain 1.4.0-beta0 (including) 1.4.0-beta0 (including)
Opendmarc Trusteddomain 1.4.0-beta1 (including) 1.4.0-beta1 (including)
Opendmarc Ubuntu bionic *
Opendmarc Ubuntu eoan *
Opendmarc Ubuntu esm-apps/xenial *
Opendmarc Ubuntu focal *
Opendmarc Ubuntu groovy *
Opendmarc Ubuntu hirsute *
Opendmarc Ubuntu impish *
Opendmarc Ubuntu kinetic *
Opendmarc Ubuntu trusty *
Opendmarc Ubuntu upstream *
Opendmarc Ubuntu xenial *

References