Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-0688 PoC — Microsoft Exchange Server 授权问题漏洞

Source
Associated Vulnerability
Title:Microsoft Exchange Server 授权问题漏洞 (CVE-2020-0688)
Description:Microsoft Exchange Server是美国微软(Microsoft)公司的一套电子邮件服务程序。它提供邮件存取、储存、转发,语音邮件,邮件过滤筛选等功能。 Microsoft Exchange Server 中存在授权问题漏洞,该漏洞源于程序无法正确处理内存中的对象。攻击者可借助特制的电子邮件利用该漏洞在系统用户的上下文中运行任意代码。以下产品及版本受到影响:Microsoft Exchange Server 2010,Microsoft Exchange Server 2013,Micro
Description
CVE-2020-0688 modified exploit for Exchange 2010 
Readme
The main issue with Exchange2010 that it's .net 2.0 based and generic deserialization gadgets do not work.

All credits goes to zcgonvh and EazyLov3. 

The project is just a combination of:
* https://github.com/zcgonvh/CVE-2020-0688/
* https://www.buaq.net/go-41757.html

How to execute:
* compile
* run Exch2010.exe 192.168.68.110 domain\user P@ssw0rd
* run ExchangeCmd.exe 192.168.68.110 domain\user P@ssw0rd
File Snapshot

[4.0K] /data/pocs/aaa286eb940c186e6beca91e6bbd420cd8405f23 ├── [9.0K] Exch2010.cs ├── [121K] ExchangeCmd.cs └── [ 423] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.