From 0d1b3ea058a839c280900aaee94aa7c0f08605d9 Mon Sep 17 00:00:00 2001 From: Jan Klopper Date: Fri, 10 Jan 2025 11:31:14 +0100 Subject: [PATCH] Update kat_finding_types.json --- .../plugins/kat_kat_finding_types/kat_finding_types.json | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/boefjes/boefjes/plugins/kat_kat_finding_types/kat_finding_types.json b/boefjes/boefjes/plugins/kat_kat_finding_types/kat_finding_types.json index 77950af21b9..556219e2829 100644 --- a/boefjes/boefjes/plugins/kat_kat_finding_types/kat_finding_types.json +++ b/boefjes/boefjes/plugins/kat_kat_finding_types/kat_finding_types.json @@ -426,6 +426,13 @@ "impact": "Various recipient mailservers might not perform all requested lookups and bounce email because of missed allowed addresses, or bounce mail entirely due to too many dns lookups.", "recommendation": "Consolidate the SPF record, remove unneeded lookups and mechanisms." }, + "KAT-DEPRECATED-SPF-MECHANISM": { + "description": "This SPF record contains a deprecated SPF mechanism.", + "source": "https://www.rfc-editor.org/rfc/rfc7208#section-5.5", + "risk": "low", + "impact": "Deprecated mechanism is used. It should not be used.", + "recommendation": "Fix the SPF record, remove deprecated mechanisms." + }, "SUB-DOMAIN-TAKEOVER": { "description": "Subdomain takeover is when an attacker takes control of an unused or improperly configured subdomain, potentially accessing sensitive information or conducting phishing attacks.", "source": "https://developer.mozilla.org/en-US/docs/Web/Security/Subdomain_takeovers",