CVE-2021-26294
HIGH EXPLOITED NUCLEIAfterlogic Aurora < 7.7.9 - Path Traversal
Title source: ruleDescription
An issue was discovered in AfterLogic Aurora through 7.7.9 and WebMail Pro through 7.7.9. They allow directory traversal to read files (such as a data/settings/settings.xml file containing admin panel credentials), as demonstrated by dav/server.php/files/personal/%2e%2e when using the caldav_public_user account (with caldav_public_user as its password).
Exploits (1)
Nuclei Templates (1)
AfterLogic Aurora and WebMail Pro < 7.7.9 - Information Disclosure
HIGHVERIFIEDby johnk3r
FOFA:
X-Server: AfterlogicDAVServer || x-server: afterlogicdavserver
Scores
CVSS v3
7.5
EPSS
0.9249
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2025-01-22
CWE
CWE-22
Status
published
Products (2)
afterlogic/aurora
< 7.7.9
afterlogic/webmail_pro
< 7.7.9
Published
Mar 07, 2021
Tracked Since
Feb 18, 2026