Are you sure this is a trusted email?


This is my first writeup about a security vulnerability that I have recently found in a private bug bounty program.

This program is a popular accountant software. The story started when I was going to send an Invoice that I have created on the website to an external email address.

So I sent the invoice to my test email address and I noticed something strange, I noticed that the website emailing system uses the customer email address to send the invoice email on behalf of his email address and that was rather odd to me because I didn’t see this function before , So I decided to take a deep look at this feature.

The HTTP request of sending invoice was something like this

Quickly I noticed that mail_from parameter is under control of attacker. Then I tried to modify this parameter to the email address that website uses to emailing their customers which is ( ) and I changed my account name to be the same which is ( Team reacted )

And after a few seconds of sending the request. I found this in my inbox.

I really was shocked by the result. The email has been sent behalf of website system itself. So I started to figure out the cause of this vulnerability and thought of ways to exploit it. 

So let me explain how this happened. The first step, I started to compare between two emails , that I sent from ( ) using vulnerability I found, and another one that website emailing system has sent when I required to resetting my password.

The header of two emails was as follows:

Details of email that I sent to myself using the vulnerability:

From: Team reacted <> Using PHPMailer 6.0.3 (
Subject: Just a message
SPF: PASS with IP Learn more
DKIM:'PASS' with domain Learn more``

Details of email that website system has sent to me when I required password reset:

From: Team reacted  <> Using PHPMailer 5.2.21 (
To: khaled <>
Subject: Password reset
SPF: PASS with IP Learn more
DKIM: 'PASS' with domain Learn more

As we can see, there is no any difference in two examples. From here we can find out that the SMTP server that responsible for sending emails using the vulnerable endpoint, is the same server that website using to emailing their customers.

How I exploited this?

So I wanted to make the attack more successfully. Quickly I browsed to one of emails that website has sent to me when I was resting my password. Then I copied the HTML code of this email template.

Abusing website features

The website allows you to make email templates that you can use when send invoices. So I copied the HTML code of their original email and put it as email template

Original email

Adding source code of their email >>>

Email template after I put it as invoice e-mail:

But what is inside Click here button? I have reported Subdomain takeover to the program and it has been fixed now. so I can’t use the subdomain takeover issue here. But I have good trick.

When you register an account at the website. The accounts of users are being registered like ( ) so I registered an account username with this name ( ) To convince the user that this is the payment page.

Abusing webforms on the website:

This website also allows you to create a web form on your account to survey your customers. so I created a webform in payments account by this way.

Another exploit:

So now I can ask website users to enter their passwords and credit cards as well and their credentials will be sent to me as webform answers.

Lessons learned:

  1. When you test a website that sends emails behalf on user email. Don’t forget to test this attack, I tested it many many times and it get success in every website I face.
  2. Try to abuse website features as you can. This was not too exploitable until I used some features in the attack.


Report Submitted : 30–4–2018

Report Triaged : 30–4–2018

$900 bounty Awarded : 7–5–2018