• XSS.stack #1 – первый литературный журнал от юзеров форума

Мануал/Книга ProxyToken CVE-2021-33766 Exploit

r1z

Still(In)Secure
КИДАЛА
Регистрация
19.07.2019
Сообщения
938
Реакции
822
Гарант сделки
30
Пожалуйста, обратите внимание, что пользователь заблокирован
Hello,

This is a continue serous vulnerabilities on 30k+ Microsoft Exchange servers 2010, 2013, 2016 and 2019 which i see it's really a big security holes where attacker can complete control on MS on the previus exploit aka " ProxyShell "; also attacker can get all list of the target companies emails with this " exploit " and also attacker can download any kind of sensitive emails which contain a specific keyword aka " Password ", etc ..

Today with this vulnerability, an unauthenticated attacker can perform configuration actions on mailboxes belonging to arbitrary users. As an illustration of the impact, this can be used to copy all emails addressed to a target and account and forward them to an account controlled by the attacker.

Attackers can use this vulnerability to generate web service requests in the Exchange Control Panel (ECP) application and steal messages from the victim's inbox.

Код:
# ./proxytoken.sh -m <Mode> -s <Exchange Server IP> -t <Target Email Address> -v <Victim Email Address>

      -m <inboxrule | check>
        - check = Check if Exchange server is vulnerable or not
        - inboxrule = Create an inbox rule in the victim's mailbox to redirect emails to the target email address.
      -s <Exchange Server IP / Domain>
      -t <Target Email Address>
      -v <Victim Email Address>

PoC video:
Код:
 https://vimeo.com/595583399

ProxyShell RCE exploit ( get system admin shell using this exploit );
ProxyShell Mail address list exploit ( get list of target company email exploit );
ProxyShell Download exploit ( all target mails or specific mail, aka "password" exploit );

NOTE, today is your last day to vote on article contest; You can vote for 3 articles at the same time !

./r1z
 

Вложения

  • proxytoken.txt
    2 КБ · Просмотры: 84
Последнее редактирование:


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх