Skip to content

Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)

Notifications You must be signed in to change notification settings

thau0x01/poc_proxylogon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

poc_proxylogon

Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)

This is script was originaly made by celesian to exploit this CVE. Then i updated it to exploit an exchange server vulnerable to SSRF but it got a Shell exploiting the EWS feature, because a client company patched it's exchange server by disabling the /ecp/DDI/DDIService.svc/ feature lol.

This may not work on several environments and this code is only a proof-of-concept to validate if your environment is vulnerable or not, do not use this to attack 3rd party infrastructure without explicit authorization!

The ssrf_exploit.py was was initially designed to get a valid MS Exchange admin account session and then upload a webshell by abusing the EWS features like other M$ Exchange clients do, like uploading e-mail attachments to the exchange server and then abusing export features to trigger the payload.

Those PoCs are uncomplete and need to be "analysed" bacause they will not work on most environment intentionnally.

About

Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages