Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports
- https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
- https://www.youtube.com/watch?v=V8KPV96g1To
- https://github.com/20142995/nuclei-templates
- https://github.com/AhenKay/INPT_report
- https://github.com/Farrhouq/Inpt-report
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/hannob/smtpsmug
- https://github.com/krlabs/eximsmtp-vulnerabilities