关联漏洞
标题:Microsoft Exchange Server 代码问题漏洞 (CVE-2021-26855)描述:Microsoft Exchange Server是美国微软(Microsoft)公司的一套电子邮件服务程序。它提供邮件存取、储存、转发,语音邮件,邮件过滤筛选等功能。 Microsoft Exchange Server 安全漏洞。攻击者可构造恶意HTTP请求,并通过Exchange Server进行身份验证。进而扫描内网,获取用户敏感信息。以下产品和版本受到影响:Microsoft Exchange Server 2013 Cumulative Update 23,Microsoft Exchange
描述
Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)
介绍
# poc_proxylogon
Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)
This is script was originaly made by celesian to exploit this CVE.
Then i updated it to exploit an exchange server vulnerable to SSRF but it got a Shell exploiting the EWS feature, because a client company patched it's exchange server by disabling the `/ecp/DDI/DDIService.svc/` feature lol.
This may not work on several environments and this code is only a proof-of-concept to validate if your environment is vulnerable or not, do not use this to attack 3rd party infrastructure without explicit authorization!
The `ssrf_exploit.py` was was initially designed to get a valid MS Exchange admin account session and then upload a webshell by abusing the EWS features like other M$ Exchange clients do, like uploading e-mail attachments to the exchange server and then abusing export features to trigger the payload.
Those PoCs are uncomplete and need to be "analysed" bacause they will not work on most environment intentionnally.
文件快照
[4.0K] /data/pocs/32be24e274138aabca6bc29f1be83ac40066d565
├── [9.7K] PoC_proxyLogon.py
├── [1002] README.md
└── [ 23K] ssrf_exploit.py
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。