SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release
嗯,用户让我用中文总结一下这篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要通读文章,抓住主要信息。 文章讲的是SmarterMail邮件软件的一个安全漏洞被积极利用。漏洞是在补丁发布两天后被利用的,目前还没有CVE编号,由watchTowr Labs跟踪。这个漏洞允许用户绕过认证,重置管理员密码,并进一步执行远程代码。 关键点包括:认证绕过、密码重置、远程代码执行、补丁发布后的快速利用、SmarterTools的回应以及新加坡 CSA之前披露的另一个高危漏洞。 接下来,我需要把这些信息浓缩到100字以内。确保涵盖漏洞的影响、攻击方式以及补丁情况。 可能的结构:先说明漏洞被利用,然后描述攻击方式和影响,最后提到补丁和后续问题。 比如:“SmarterMail软件存在安全漏洞WT-2026-0001,允许攻击者绕过认证重置管理员密码,并通过内置功能执行远程代码。尽管SmarterTools已发布补丁(Build 9511),但该漏洞仍在被积极利用。该漏洞可能被用于获取系统级权限,并引发进一步的安全威胁。” 这样既简洁又全面。 </think> SmarterMail软件存在安全漏洞WT-2026-0001,允许攻击者绕过认证重置管理员密码,并通过内置功能执行远程代码。尽管SmarterTools已发布补丁(Build 9511),但该漏洞仍在被积极利用。该漏洞可能被用于获取系统级权限,并引发进一步的安全威胁。 2026-1-22 09:46:0 Author: thehackernews.com(查看原文) 阅读量:1 收藏

Vulnerability / Email Security

A new security flaw in SmarterTools SmarterMail email software has come under active exploitation in the wild, two days after the release of a patch.

The vulnerability, which currently does not have a CVE identifier, is tracked by watchTowr Labs as WT-2026-0001. It was patched by SmarterTools on January 15, 2026, with Build 9511, following responsible disclosure by the exposure management platform on January 8, 2026.

It has been described as an authentication bypass flaw that could allow any user to reset the SmarterMail system administrator password by means of a specially crafted HTTP request to the "/api/v1/auth/force-reset-password" endpoint.

"The kicker of course being that said user is able to use RCE-as-a-feature functions to directly execute OS [operating system] commands," watchTowr Labs researchers Piotr Bazydlo and Sina Kheirkhah said.

The problem is rooted in the function "SmarterMail.Web.Api.AuthenticationController.ForceResetPassword," which not only allows the endpoint to be reached without authentication, but also leverages the fact that the reset request is accompanied by a boolean flag named "IsSysAdmin" to handle the incoming request depending on whether the user is a system administrator or not.

Cybersecurity

In case the flag is set to "true" (i.e., indicating that the user is an administrator), the underlying logic performs the following sequence of actions -

  • Obtain the configuration corresponding to the username passed as input in the HTTP request
  • Create a new system administrator item with the new password
  • Update the administrator account with the new password

In other words, the privileged path is configured such that it can trivially update an administrator user's password by sending an HTTP request with the username of an administrator account and a password of their choice. This complete lack of security control could be abused by an attacker to obtain elevated access, provided they have knowledge of an existing administrator username.

It doesn't end there, for the authentication bypass provides a direct path to remote code execution through a built-in functionality that allows a system administrator to execute operating system commands on the underlying operating system and obtain a SYSTEM-level shell.

This can be accomplished by navigating to the Settings page, creating a new volume, and supplying an arbitrary command in the Volume Mount Command field that gets subsequently executed by the host's operating system.

The cybersecurity company said it chose to make the finding public following a post on the SmarterTools Community Portal, where a user claimed that they lost access to their admin account, with the logs indicating the use of the same "force-reset-password" endpoint to change the password on January 17, 2026, two days after the release of the patch.

This likely indicates that the attackers managed to reverse engineer the patches and reconstruct the flaw. To make matters worse, it doesn't help that SmarterMail's release notes are vague and do not explicitly mention what issues were addressed. One item in the bulleted list for Build 9511 simply mentions "IMPORTANT: Critical security fixes."

Cybersecurity

In response, SmarterTools CEO Tim Uzzanti hinted that this is done so to avoid giving threat actors more ammunition, but noted they plan to send an email every time a new CVE is discovered and again when a build has been released to resolve the issue.

"In our 23+ years, we have had only a few CVEs, which were primarily communicated through release notes and critical fix references," Uzzanti said in response to transparency concerns raised by its customers. "We appreciate the feedback that encouraged this change in policy moving forward."

It's currently not clear whether such an email was sent to SmarterMail administrators this time around. The Hacker News has reached out to SmarterTools for comment, and we will update the story if we hear back.

The development comes less than a month after the Cyber Security Agency of Singapore (CSA) disclosed details of a maximum-severity security flaw in SmarterMail (CVE-2025-52691, CVSS score: 10.0) that could be exploited to achieve remote code execution.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/smartermail-auth-bypass-exploited-in.html
如有侵权请联系:admin#unsafe.sh