You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Security problem on ZeroMail (and all zeromail clones) need to be allowed [email protected]: (the auth address), malicious user can read, delete, send messages have full access to your mailbox! #2833
Cloned user have full access to the original user mailbox. If have a [email protected] and someone else are registering another [email protected] have full access to the original user mailbox! On any name service if the user can change in the .json file his name, or the name service can manipulated like ZeroID anyone's emails can be easily accessed.
If multiple user are registered in cryptoid.bit with the same nickname.
-1. Not possible to filter [email protected]: (the auth address) Like this: [email protected]:De86hbTrEftznbTRFVcDemj7Zhgvfdsx
-2. The system can not detected before the secondary registration one user with the same nickname already registered.
-3. On [email protected] the system is not sure from who to send the letter to. And send both the users with the same nickname. Both user are accessing the same mailbox and can send, delete, read messages have full access to the original user mailbox.
-4. A hacker can manipulate the system so that someone else to receive the letter.
Affected mail services ZeroMail, ZeroMailX, ZeroVerse services and any ZeroMail Clones. Need to use the public key hash and nickname combination to identify the user. Like this: [email protected]:De86hbTrEftznbTRFVcDemj7Zhgvfdsx
Centralized ID providers like ZeroID they are completely untrusted. It is very easy to hack the system.