CVE-2021-26294

HIGH EXPLOITED NUCLEI

Afterlogic Aurora < 7.7.9 - Path Traversal

Title source: rule

Description

An issue was discovered in AfterLogic Aurora through 7.7.9 and WebMail Pro through 7.7.9. They allow directory traversal to read files (such as a data/settings/settings.xml file containing admin panel credentials), as demonstrated by dav/server.php/files/personal/%2e%2e when using the caldav_public_user account (with caldav_public_user as its password).

Nuclei Templates (1)

AfterLogic Aurora and WebMail Pro < 7.7.9 - Information Disclosure
HIGHVERIFIEDby johnk3r
FOFA: X-Server: AfterlogicDAVServer || x-server: afterlogicdavserver

Scores

CVSS v3 7.5
EPSS 0.9249
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2025-01-22
CWE
CWE-22
Status published
Products (2)
afterlogic/aurora < 7.7.9
afterlogic/webmail_pro < 7.7.9
Published Mar 07, 2021
Tracked Since Feb 18, 2026