<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Smartermail — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/smartermail/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/smartermail/feed.xml" rel="self" type="application/rss+xml"/><item><title>SmarterTools SmarterMail Local File Inclusion Vulnerability (CVE-2026-7807)</title><link>https://feed.craftedsignal.io/briefs/2024-01-smartermail-lfi/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-smartermail-lfi/</guid><description>SmarterTools SmarterMail builds prior to 9560 contain a local file inclusion vulnerability in the /api/v1/report/summary/{type} API endpoint (CVE-2026-7807) that allows authenticated users to read arbitrary .json files, potentially leading to credential compromise.</description><content:encoded><![CDATA[<p>SmarterTools SmarterMail, a widely used mail server software, is vulnerable to a local file inclusion (LFI) flaw tracked as CVE-2026-7807. This vulnerability affects builds prior to 9560. Authenticated users can exploit the vulnerability by crafting specific requests to the <code>/api/v1/report/summary/{type}</code> API endpoint, enabling them to read arbitrary <code>.json</code> files from the server&rsquo;s file system. Successful exploitation, combined with weak encryption and hardcoded keys, may allow attackers to decrypt and steal stored passwords and 2FA secrets for all users. This poses a significant risk to the confidentiality and integrity of the SmarterMail server and its user accounts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the SmarterMail web interface.</li>
<li>The attacker crafts a malicious HTTP GET request to the <code>/api/v1/report/summary/{type}</code> endpoint.</li>
<li>The <code>{type}</code> parameter is manipulated to include a path traversal sequence (e.g., <code>../../../../</code>) to target a specific <code>.json</code> file outside the intended directory.</li>
<li>The SmarterMail server processes the request without proper input validation, allowing the attacker to read the contents of the specified <code>.json</code> file.</li>
<li>The attacker targets <code>.json</code> files containing sensitive information, such as configuration files or password stores.</li>
<li>The attacker leverages weak encryption algorithms and hardcoded keys (if present) to decrypt the contents of the stolen <code>.json</code> files.</li>
<li>The attacker extracts user credentials, including passwords and 2FA secrets, from the decrypted data.</li>
<li>The attacker uses the stolen credentials to compromise user accounts and gain unauthorized access to sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7807 can lead to the complete compromise of a SmarterMail server. Attackers can steal user credentials, including passwords and 2FA secrets, potentially impacting all users on the system. This access enables attackers to read sensitive emails, send malicious emails, and potentially pivot to other systems on the network. The impact includes data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade SmarterMail to build 9560 or later to patch CVE-2026-7807 (reference: overview).</li>
<li>Implement the Sigma rule <code>Detect SmarterMail LFI Attempt</code> to detect exploitation attempts against the <code>/api/v1/report/summary/{type}</code> endpoint (reference: rules).</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences in the <code>/api/v1/report/summary/{type}</code> endpoint (reference: rules logsource).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>lfi</category><category>file-inclusion</category><category>credential-access</category><category>smartermail</category></item></channel></rss>