CVE-2021-26293

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to perform directory traversal attacks when DAV is enabled in AfterLogic Aurora and WebMail Pro. Attackers can create new files, including executable files under the web root, potentially leading to remote code execution. Affected users include all organizations running vulnerable versions with DAV enabled.

💻 Affected Systems

Products:
  • AfterLogic Aurora
  • AfterLogic WebMail Pro
Versions: Aurora through 8.5.3, WebMail Pro through 8.5.3
Operating Systems: Any OS running affected software
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when DAV (WebDAV) functionality is enabled. The vulnerability exists in DAVServer.php (8.x) and DAV/Server.php (7.x).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Webshell deployment allowing persistent access, data theft, and further exploitation of the mail server environment.

🟢

If Mitigated

Limited impact with proper network segmentation, file system permissions, and monitoring in place.

🌐 Internet-Facing: HIGH - Webmail systems are typically internet-facing, making them prime targets for exploitation.
🏢 Internal Only: MEDIUM - Internal systems could still be exploited by compromised internal accounts or attackers who have gained initial foothold.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires DAV access, which typically requires authentication. However, once authenticated, the directory traversal is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 8.5.3

Vendor Advisory: https://auroramail.wordpress.com/2021/02/03/addressing-dav-related-vulnerability-in-webmail-and-aurora/

Restart Required: Yes

Instructions:

1. Download the latest version from AfterLogic website. 2. Backup your current installation. 3. Replace vulnerable files with patched versions. 4. Restart the web server service.

🔧 Temporary Workarounds

Disable DAV functionality

all

Disable WebDAV access if not required for your use case

Edit configuration to disable DAV modules
Remove or rename DAVServer.php/Server.php files

Restrict file system permissions

linux

Limit web server user permissions to prevent file creation in sensitive directories

chmod 755 /var/www
chown root:root /var/www
setfacl -m u:www-data:r-x /var/www

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the mail server from critical systems
  • Deploy web application firewall (WAF) rules to detect and block directory traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check if DAV is enabled and version is 8.5.3 or earlier. Review configuration files for DAV settings.

Check Version:

Check version in admin panel or review software documentation files

Verify Fix Applied:

Verify version is updated beyond 8.5.3 and test DAV functionality for directory traversal attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation patterns in web root
  • DAV requests with '../' sequences
  • Webshell file access logs

Network Indicators:

  • Unusual outbound connections from mail server
  • DAV protocol abuse patterns

SIEM Query:

source="webmail.log" AND ("../" OR "..\" OR "%2e%2e%2f") AND method="PUT" OR method="PROPPATCH"

🔗 References

📤 Share & Export