SMTP Spamming

I am noticing a problem with SuiteCRM, There apparently is an undiscovered vulnerability that is causing us extreme issues.

If I enable an SMTP account in SuiteCRM, our server gets used as a Spam Relay rather quickly sending bulk emails originating from our domain.

So I have to change the mail account password and disconnect the SMTP account from SuiteCRM. Then everything is fine.

But the 3 sales people on our current system cannot send emails through the CRM anymore if I disable SMTP.

With the spamming, I figured it was a fluke from my windows WAMP Server, so I moved over to DigitalOcean on a CentOS 7 server in the cloud.

I enabled DKIM on our domain to try and eliminate problems, and I turned on SMTP again in the SuiteCRM system.

Boom spam relay started up again. I am running the latest build from GitHub.

Here is an example of the “Catch-All” bounce-back we get:


Begin forwarded message:

From: "Content-filter at hiero.abul.org" <postmaster@hiero.abul.org>
Subject: Considered UNSOLICITED BULK EMAIL, apparently from you
Date: March 23, 2017 at 7:19:20 AM EDT
To: <Koch0534@majordisplay.com>

A message from < Koch0534@majordisplay.com> 
to: michel@gilantoli.com 
to: christophe.catarina@gmail.com 
to: jean.peyratout@gmail.com 
to: kolter@openics.org 
to: h.koutchouk@saint-loubes.fr 

was considered unsolicited bulk e-mail (UBE). 

Our internal reference code for your message is 27562-07/iHkLGB8iRfng 

The message carried your return address, so it was either a genuine mail 
from you, or a sender address was faked and your e-mail address abused 
by third party, in which case we apologize for undesired notification. 

We do try to minimize backscatter for more prominent cases of UBE and 
for infected mail, but for less obvious cases some balance between 
losing genuine mail and sending undesired backscatter is sought, 
and there can be some collateral damage on either side. 

First upstream SMTP client IP address: [147.210.68.129] osiris.abul.org 
According to a 'Received:' trace, the message apparently originated at: 
 [160.120.51.136], osiris.abul.org osiris.abul.org [147.210.68.129] using 
 TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits) Client CN 
 " osiris.abul.org", Issuer " osiris.abul.org" (not verified) 

Return-Path: < Koch0534@majordisplay.com> 
From: "Heather Koch" < Koch0534@majordisplay.com> 
Message-ID: < 20170323111911.B5CB77C665E80A@majordisplay.com> 
Subject: I've got strong reasons to believe that this stock is about to soar. 

Delivery of the email was stopped! 
Reporting-MTA: dns; hiero.abul.org 
Received-From-MTA: dns; hiero.abul.org ([127.0.0.1]) 
Arrival-Date: Thu, 23 Mar 2017 12:19:20 +0100 (CET) 

Original-Recipient: rfc822; infos@abul.org 
Final-Recipient: rfc822; michel@gilantoli.com 
Action: failed 
Status: 5.7.0 
Diagnostic-Code: smtp; 554 5.7.0 Bounce, id=27562-07 - spam 
Last-Attempt-Date: Thu, 23 Mar 2017 12:19:20 +0100 (CET) 
Final-Log-ID: 27562-07/iHkLGB8iRfng 

Original-Recipient: rfc822; infos@abul.org 
Final-Recipient: rfc822; christophe.catarina@gmail.com 
Action: failed 
Status: 5.7.0 
Diagnostic-Code: smtp; 554 5.7.0 Bounce, id=27562-07 - spam 
Last-Attempt-Date: Thu, 23 Mar 2017 12:19:20 +0100 (CET) 
Final-Log-ID: 27562-07/iHkLGB8iRfng 

Original-Recipient: rfc822; infos@abul.org 
Final-Recipient: rfc822; jean.peyratout@gmail.com 
Action: failed 
Status: 5.7.0 
Diagnostic-Code: smtp; 554 5.7.0 Bounce, id=27562-07 - spam 
Last-Attempt-Date: Thu, 23 Mar 2017 12:19:20 +0100 (CET) 
Final-Log-ID: 27562-07/iHkLGB8iRfng 

Original-Recipient: rfc822; infos@abul.org 
Final-Recipient: rfc822; kolter@openics.org 
Action: failed 
Status: 5.7.0 
Diagnostic-Code: smtp; 554 5.7.0 Bounce, id=27562-07 - spam 
Last-Attempt-Date: Thu, 23 Mar 2017 12:19:20 +0100 (CET) 
Final-Log-ID: 27562-07/iHkLGB8iRfng 

Original-Recipient: rfc822; infos@abul.org 
Final-Recipient: rfc822; h.koutchouk@saint-loubes.fr 
Action: failed 
Status: 5.7.0 
Diagnostic-Code: smtp; 554 5.7.0 Bounce, id=27562-07 - spam 
Last-Attempt-Date: Thu, 23 Mar 2017 12:19:20 +0100 (CET) 
Final-Log-ID: 27562-07/iHkLGB8iRfng 
Return-Path: < Koch0534@majordisplay.com> 
Received: from osiris.abul.org ( osiris.abul.org [147.210.68.129]) 
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) 
 (Client CN " osiris.abul.org", Issuer " osiris.abul.org" (not verified)) 
 by hiero.abul.org (Postfix) with ESMTPS id 6B3D3158D7B2 
 for < infos@abul.org>; Thu, 23 Mar 2017 12:19:20 +0100 (CET) 
Received: from [160.120.51.136] (unknown [160.120.51.136]) 
 by osiris.abul.org (Postfix) with ESMTP id 6A24223FA7 
 for < infos@abul.org>; Thu, 23 Mar 2017 11:58:14 +0100 (CET) 
Received: (from apache@localhost) 
 by majordisplay.com (8.14.7/8.14.7/Submit) id B5CB77C665E80A; 
 Thu, 23 Mar 2017 11:19:11 -0000 
Message-Id: < 20170323111911.B5CB77C665E80A@majordisplay.com> 
To: infos@abul.org 
Subject: I've got strong reasons to believe that this stock is about to soar. 
X-PHP-Originating-Script: 1007:Sendmail.php 
From: "Heather Koch" < Koch0534@majordisplay.com> 
Date: Thu, 23 Mar 2017 11:19:11 -0000 
Content-Type: text/plain; charset=UTF-8 
Content-Transfer-Encoding: 8bit 
MIME-Version: 1.0 

PLEASE lets us know how to fix this! its a SuiteCRM exploit that has remained undetected up to this point.

In case you are wondering, the email: Koch0534@majordisplay.com is fake and does not exist in our records.

Bump… nobody???

If you believe this is a valid SuiteCRM bug please post on GitHub

Then why have a forum? Seems kind of pointless IMHO…

And I am not entirely sure what it is, thats why I am asking here…

GitHub is for valid out the box Bugs and Pull Requests. The forums is for community discussions, instance issues that are not out the box and questions etc…

:slight_smile:

@mbates14

Could you elaborate on how you got DKIM working with SuiteCRM? I’d like to implement this as well. Never done it before. Happy for pointers!