Do smart people ever say they’re smart? SmarterTools Smarter... #1744
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
This post reverse-engineers and reproduces CVE-2025-52691, a pre-auth (unauthenticated) remote code execution issue in SmarterTools SmarterMail that can be exploited as an unauthenticated arbitrary file write and then turned into IIS/ASP.NET code execution by writing an
.aspxfile into a web-accessible directory. The blog notes the vulnerability was fixed in build 9413 (released Oct 10, 2025), while disclosure/advisory occurred in ...🔧 Technical Details
Pre-auth arbitrary file write by abusing JSON-deserialized fields used in path construction: If an unauthenticated upload endpoint accepts a JSON form field (e.g.,
contextData) that is deserialized (e.g., via JSON.NET) into an object with a public settable property (e.g.,guid), and that property is later embedded into a generated filename (e.g.,att_{CleanGuid(guid)}_{n}.{ext}) without strict normalization and traversal checks, an attacker can inject traversal sequences (e.g.,../../..) to escape the intended directory. If the final path is built by naive string formatting/concatenation (directory +"/"+ filename) rather than canonicalized join + validation, the upload becomes an unauthenticated arbitrary file write primitive.Reliable RCE on IIS by combining traversal-based write + attacker-controlled executable extension: If the saved extension is derived from an attacker-controlled filena...
🤖 Agent Actions
Summary:
Testing:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.