CVE-2021-43270

7.5 HIGH

📋 TL;DR

This vulnerability in Datalust Seq.App.EmailPlus allows email notifications to be sent via unencrypted SMTP on port 25 when encryption on port 465 was intended. This exposes sensitive email content to interception during transmission. Organizations using affected versions of the Seq email notification app are impacted.

💻 Affected Systems

Products:
  • Datalust Seq.App.EmailPlus (seq-app-htmlemail)
Versions: 3.1.0-dev-00148, 3.1.0-dev-00170, 3.1.0-dev-00176
Operating Systems: All platforms running Seq
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects development versions; production releases are not vulnerable. Vulnerability occurs when email notifications are configured to use SMTP.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive email content (including potentially authentication tokens, system alerts, or confidential data) is intercepted by attackers on the network, leading to data breaches or credential theft.

🟠

Likely Case

Email notifications containing system logs, alerts, or monitoring data are transmitted in cleartext, exposing operational information to network eavesdroppers.

🟢

If Mitigated

With proper network segmentation and monitoring, exposure is limited to internal network segments, reducing external attack surface.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to intercept SMTP traffic. No authentication bypass needed as it's a configuration/implementation flaw.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in later development versions and production releases

Vendor Advisory: https://github.com/datalust/seq-app-htmlemail/pull/93

Restart Required: Yes

Instructions:

1. Update to a non-vulnerable version of Seq.App.EmailPlus. 2. Restart the Seq service. 3. Verify email notifications are using encrypted SMTP (port 465 with TLS).

🔧 Temporary Workarounds

Force TLS SMTP Configuration

all

Manually configure email notifications to use SMTP with explicit TLS on port 465

Configure Seq email settings to use smtps://server:465 with TLS enabled

Disable Email Notifications

all

Temporarily disable email notifications until patched

Disable email notification apps in Seq configuration

🧯 If You Can't Patch

  • Implement network segmentation to isolate Seq server from untrusted networks
  • Use network monitoring to detect cleartext SMTP traffic on port 25 from Seq servers

🔍 How to Verify

Check if Vulnerable:

Check Seq.App.EmailPlus version in Seq dashboard or configuration files for affected versions

Check Version:

Check Seq dashboard → Apps → EmailPlus version or inspect Seq configuration files

Verify Fix Applied:

Verify email notifications are sent successfully using encrypted SMTP (port 465) and monitor network traffic for cleartext SMTP on port 25

📡 Detection & Monitoring

Log Indicators:

  • SMTP connection failures on port 465
  • Email notification failures in Seq logs

Network Indicators:

  • Cleartext SMTP traffic (port 25) originating from Seq servers
  • Lack of TLS encryption on email notification traffic

SIEM Query:

source="seq" AND ("SMTP" OR "email") AND ("port 25" OR "cleartext")

🔗 References

📤 Share & Export