Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住关键点。 文章主要讲的是FreeScout平台的一个严重漏洞,编号CVE-2026-28289。这个漏洞允许黑客远程执行代码,不需要用户互动或认证。之前有一个漏洞CVE-2026-27636被修复了,但这次的新漏洞绕过了那个修复措施。 研究人员发现,通过在文件名前添加零宽度空格(Unicode U+200B),可以绕过文件名验证机制。这样上传的恶意文件会被处理成隐藏文件,触发之前的漏洞。 攻击者可以通过发送恶意邮件附件来触发这个漏洞,上传的文件可以在服务器上执行命令,导致服务器被完全控制。FreeScout已经发布了补丁版本1.8.207修复这个问题,并建议用户立即升级。 总结时要包括漏洞名称、影响、攻击方式、后果以及修复建议。确保语言简洁明了,不超过100字。 </think> FreeScout平台存在严重漏洞(CVE-2026-28289),允许黑客通过发送恶意邮件附件实现零点击远程代码执行。该漏洞绕过此前修复的另一个远程代码执行漏洞(CVE-2026-27636)的安全措施,利用零宽度空格字符绕过文件名验证机制。攻击可能导致服务器完全妥协、数据泄露及服务中断。已发布补丁修复该问题(版本1.8.207),建议用户立即升级以避免风险。 2026-3-4 22:0:22 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers

A maximum severity vulnerability in the FreeScout helpdesk platform allows hackers to achieve remote code execution without any user interaction or authentication.

The flaw is tracked as CVE-2026-28289 and bypasses a fix for another remote code execution (RCE) security issue (CVE-2026-27636) that could be exploited by authenticated users with upload permissions.

Researchers at OX Security, a company that secures applications from code to runtime, say that an attacker can exploit the new vulnerability by "sending a single crafted email to any address configured in FreeScout."

According to them, the fix attempted to block dangerous file uploads by modifying filenames with restricted extensions or those starting with a dot.

The OX Research team discovered that a zero-width space (Unicode U+200B) could be placed before the filename to bypass the recently introduced validation mechanism, since the character is not treated as visible content.

Subsequent processing removes that character, allowing the file to be saved as a dotfile, and hence, still triggering CVE-2026-27636 exploitation by completely bypassing the latest security checks.

The exploitation chain
The exploitation chain
Source: OX Research

Making matters worse, CVE-2026-28289 can be triggered by a malicious email attachment delivered to a mailbox configured in FreeScout, the researchers say.

The program stores the attachment in “/storage/attachment/…,” enabling the attacker to access the uploaded payload through the web interface and execute commands on the server without authentication or user interaction, making it a zero-click vulnerability.

“A patch bypass vulnerability in FreeScout 1.8.206 allows any authenticated user with file upload permissions to achieve Remote Code Execution (RCE) on the server by uploading a malicious .htaccess file using a zero-width space character prefix to bypass the security check,” the vendor says in a security bulletin.

FreeScout is an open-source help desk and shared mailbox platform used by organizations to manage customer support emails and tickets. It’s a self-hosted alternative to Zendesk or Help Scout.

The project’s GitHub repository has 4,100 stars and over 620 forks, and OX Research reports that its Shodan scans returned 1,100 publicly exposed instances, indicating it’s a widely used solution.

CVE‑2026‑28289 affects all FreeScout versions up to and including 1.8.206 and was patched in version 1.8.207, released four days ago.

The FreeScout team warned that successful exploitation of CVE‑2026‑28289 may result in full server compromise, data breaches, lateral movement into internal networks, and service disruption. Hence, immediate patching is advised.

OX Research has also recommended disabling ‘AllowOverrideAll’ in the Apache configuration on the FreeScout server, even when on version 1.8.207.

No active exploitation of CVE‑2026‑28289 has been observed in the wild as of writing this, but given the nature of this flaw, the danger of malicious activity starting soon is very high.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/mail2shell-zero-click-attack-lets-hackers-hijack-freescout-mail-servers/
如有侵权请联系:admin#unsafe.sh