关联漏洞
标题:Microsoft Exchange Server 代码问题漏洞 (CVE-2021-26855)描述:Microsoft Exchange Server是美国微软(Microsoft)公司的一套电子邮件服务程序。它提供邮件存取、储存、转发,语音邮件,邮件过滤筛选等功能。 Microsoft Exchange Server 安全漏洞。攻击者可构造恶意HTTP请求,并通过Exchange Server进行身份验证。进而扫描内网,获取用户敏感信息。以下产品和版本受到影响:Microsoft Exchange Server 2013 Cumulative Update 23,Microsoft Exchange
描述
CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065
介绍

- #### [Indicators](/indicators/README.md)
- #### [Timeline](Timeline.md)
- #### [Tool Detections](/tool-detections/README.md)
- #### [Post Exploitation](/post-exploitation/README.md)
- #### [Mitigations and Detections](/mitigations-and-detections/README.md)
- #### [Vendor Security Research](/vendor-security-research/README.md)
- #### [Government or Agency Security Research](/gov-sec-research/README.md)
- #### [Tweets](Tweets.md)
- #### [Cool Resources](/resources/README.md)
## To-Do Checklist
- [ ] Indicators
- [X] Timeline
- [ ] Tool Detections
- [ ] Post Exploitation
- [ ] Mitigations and Detections
- [ ] Vendor Security Research
- [ ] Government or Agency Security Research
- [X] Tweets
- [ ] Cool Resources
# Contributing
If you want to Contribute to this all-in-one resource source for HAFNIUM Microsoft Exchange 0Day, please just do a pull request.
文件快照
[4.0K] /data/pocs/fbd37aaf2dc8b02a37b383db94afa287ca8c81bf
├── [1.6K] CVE.md
├── [ 432] github-repos.md
├── [4.0K] gov-sec-research
│ ├── [ 0] CERT-Latvia.md
│ ├── [ 0] CISA.md
│ └── [ 67] README.md
├── [4.0K] indicators
│ ├── [ 522] hashes
│ ├── [ 212] ip-addresses
│ ├── [3.1K] README.md
│ ├── [ 933] useragents
│ ├── [ 189] webshell_names
│ └── [ 721] webshell_paths
├── [4.0K] mitigations-and-detections
│ └── [ 32] README.md
├── [4.0K] post-exploitation
│ └── [ 22] README.md
├── [ 945] README.md
├── [4.0K] resources
│ └── [ 716] README.md
├── [4.0K] Timeline.md
├── [4.0K] tool-detections
│ ├── [4.0K] Azure-Sentinel
│ │ ├── [ 217] Downloads of PowerCat
│ │ ├── [ 339] Exchange PowerShell Snapin being loaded
│ │ ├── [1.5K] HAFNIUMNewUMServiceChildProcess.yaml
│ │ ├── [1.4K] HAFNIUMSuspiciousExchangeRequestPattern.yaml
│ │ ├── [1.3K] HAFNIUMSuspiciousFileDownloads.yaml
│ │ ├── [1.2K] HAFNIUMSuspiciousIMServiceError.yaml
│ │ ├── [1.8K] HAFNIUMUmServiceSuspiciousFile.yaml
│ │ └── [ 181] Nishang Invoke-PowerShellTcpOneLine in Windows Event Logging
│ ├── [4.0K] Microsoft-Defender
│ │ ├── [ 153] Generic Microsoft Defender AV Queries
│ │ ├── [ 77] Microsoft Defender AV Queries
│ │ ├── [ 250] UMWorkerProcess.exe in Exchange creating abnormal content
│ │ └── [ 146] UMWorkerProcess.exe spawning
│ └── [ 209] README.md
├── [1.4K] Tweets.md
└── [4.0K] vendor-security-research
├── [ 865] Cisco-Talos.md
├── [ 13K] Fireeye.md
├── [ 0] Mandiant-Managed-Defense.md
├── [ 0] Nextron-Systems.md
├── [ 276] README.md
├── [ 0] Recon-Infosec.md
├── [ 20K] Red-Canary.md
└── [ 18K] Volexity.md
9 directories, 38 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。