CVE-2021-29281

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload arbitrary files to GFI Mail Archiver servers via insecure Telerik Web UI components. It affects GFI Mail Archiver versions up to and including 15.1, potentially leading to remote code execution.

💻 Affected Systems

Products:
  • GFI Mail Archiver
Versions: Up to and including version 15.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists due to insecure implementation of Telerik Web UI plugin affected by CVE-2014-2217 and CVE-2017-11317.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution, data exfiltration, ransomware deployment, or creation of persistent backdoors.

🟠

Likely Case

Web shell upload leading to server control, data theft, and lateral movement within the network.

🟢

If Mitigated

Limited impact if file uploads are restricted to specific directories with proper permissions and input validation.

🌐 Internet-Facing: HIGH - Exploit is unauthenticated and public proof-of-concept exists, making internet-facing systems prime targets.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to insider threats or compromised internal hosts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available on Exploit-DB (ID 50181) and other sources. Attack requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 15.1

Vendor Advisory: https://www.gfi.com/products-and-solutions/network-security-solutions/gfi-archiver

Restart Required: Yes

Instructions:

1. Upgrade GFI Mail Archiver to latest version. 2. Apply all security patches from GFI. 3. Restart the application/service.

🔧 Temporary Workarounds

Block Telerik Web UI endpoints

windows

Block access to vulnerable Telerik Web UI endpoints via firewall or web application firewall

# Example firewall rule to block Telerik endpoints
# Windows: netsh advfirewall firewall add rule name="Block_Telerik" dir=in action=block protocol=TCP localport=80,443 remoteip=any program="path\to\gfi.exe"
# Web.config modification: Add request filtering for Telerik paths

Restrict file upload permissions

windows

Configure strict file upload restrictions and validation

# Set restrictive NTFS permissions on upload directories
icacls "C:\Program Files\GFI\MailArchiver\Uploads" /deny Everyone:(OI)(CI)(W)
# Configure web.config to restrict file types and sizes

🧯 If You Can't Patch

  • Isolate GFI Mail Archiver server in separate network segment with strict firewall rules
  • Implement web application firewall with file upload protection and Telerik-specific rules

🔍 How to Verify

Check if Vulnerable:

Check GFI Mail Archiver version in application interface or registry: HKEY_LOCAL_MACHINE\SOFTWARE\GFI\MailArchiver\Version

Check Version:

reg query "HKLM\SOFTWARE\GFI\MailArchiver" /v Version

Verify Fix Applied:

Verify version is greater than 15.1 and test file upload functionality with malicious payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to Telerik endpoints
  • ASPX/ASP files in upload directories
  • Web.config modifications
  • Failed authentication attempts to admin interfaces

Network Indicators:

  • HTTP POST requests to /Telerik.Web.UI.WebResource.axd
  • File uploads with unusual extensions (.aspx, .ashx, .asmx)
  • Outbound connections from GFI server to unknown IPs

SIEM Query:

source="GFI Mail Archiver" AND (url="*Telerik*" OR file_extension="aspx" OR file_extension="ashx")

🔗 References

📤 Share & Export