eliotsykes / rails-security-checklist

:key: Community-driven Rails Security Checklist (see our GitHub Issues for the newest checks that aren't yet in the README)
1.36k stars 96 forks source link

Consider configuring mail providers (e.g. Mailgun, Mailchimp) not to store, track and/or shorten sensitive URLs (e.g. reset password links, any URL with a token) #36

Open eliotsykes opened 6 years ago

eliotsykes commented 6 years ago

Mail providers (such as Mailgun & Mailchimp) are often setup to track all links in the emails that are sent through their servers.

This means your provider may be logging and building reports for sensitive URLs that could be exploited (e.g. reset password links sent by email, URLs for digital goods and giftcards).

Considerations:

eliotsykes commented 6 years ago

So according to some reports, Mailgun has been attacked and it involved a client's password reset emails Mailgun were storing (for compliance?) being intercepted. See comments at https://news.ycombinator.com/item?id=16079544

eliotsykes commented 6 years ago

Consider adding guideline that if you use Mandrill (not Mailgun), to set view_content_link to false by default:

view_content_link set to false to remove content logging for sensitive emails

https://mandrillapp.com/api/docs/messages.JSON.html#method-send

eliotsykes commented 6 years ago

Removed Sendgrid from issue as according to docs on their site they do not log email content: https://sendgrid.com/docs/Classroom/Track/Collecting_Data/is_there_a_way_to_see_the_content_of_transactional_emails_i_send.html