Exchange SSRF to RCE Stable EXP

简介: Exchange SSRF to RCE Stable EXP

CVE-2021-26855

CVE-2021-27065

⚠️For educational and learning purposes only

GitHub: https://github.com/evilashz/ExchangeSSRFtoRCEExploit

Usage

[*] ProxyLogon-Exchange SSRF to RCE Exploit Chain.
        - Author @Evilash
./Exchange_SSRFtoRCEChainExploit.py <https://url> <MailUser>

Real and stable exploit to RCE , enjoy it :)

Fofa Quary

microsoft exchange 2013:
app="Microsoft-Exchange-2013"||app="Microsoft-Exchange-Server-2013-CU21"||app="Microsoft-Exchange-Server-2013-CU17"||app="Microsoft-Exchange-Server-2013-CU23"||app="Microsoft-Exchange-Server-2013-CU13"||app="Microsoft-Exchange-Server-2013-CU22"||app="Microsoft-Exchange-Server-2013-CU11"||app="Microsoft-Exchange-Server-2013-CU2"||app="Microsoft-Exchange-Server-2013-CU16"||app="Microsoft-Exchange-Server-2013-CU19"||app="Microsoft-Exchange-Server-2013-CU3"||app="Microsoft-Exchange-Server-2013-CU18"||app="Microsoft-Exchange-Server-2013-CU5"||app="Microsoft-Exchange-Server-2013-CU20"||app="Microsoft-Exchange-Server-2013-CU12"||app="Microsoft-Exchange-Server-2013-CU15"||app="Microsoft-Exchange-Server-2013-CU10"||app="Microsoft-Exchange-Server-2013-CU9"||app="Microsoft-Exchange-Server-2013-CU6"||app="Microsoft-Exchange-Server-2013-CU7"||app="Microsoft-Exchange-Server-2013-CU1"||app="Microsoft-Exchange-Server-2013-CU14"||app="Microsoft-Exchange-Server-2013-CU8"||app="Microsoft-Exchange-Server-2013-RTM"||app="Microsoft-Exchange-Server-2013-SP1"||app="Microsoft-Exchange-2013"
microsoft exchange 2016:
app="Microsoft-Exchange-Server-2016-CU19"||app="Microsoft-Exchange-Server-2016-CU3"||app="Microsoft-Exchange-Server-2016-CU12"||app="Microsoft-Exchange-Server-2016-RTM"||app="Microsoft-Exchange-Server-2016-CU7"||app="Microsoft-Exchange-Server-2016-CU17"||app="Microsoft-Exchange-Server-2016-CU2"||app="Microsoft-Exchange-Server-2016-CU1"||app="Microsoft-Exchange-Server-2016-CU14"||app="Microsoft-Exchange-Server-2016-CU5"||app="Microsoft-Exchange-Server-2016-CU11"||app="Microsoft-Exchange-Server-2016-CU9"||app="Microsoft-Exchange-Server-2016-CU16"||app="Microsoft-Exchange-Server-2016-CU10"||app="Microsoft-Exchange-Server-2016-CU6"||app="Microsoft-Exchange-Server-2016-CU13"||app="Microsoft-Exchange-Server-2016-CU18"||app="Microsoft-Exchange-Server-2016-CU8"||app="Microsoft-Exchange-Server-2016-CU4"||app="Microsoft-Exchange-2016-POP3-server"
microsoft exchange 2019:
app="Microsoft-Exchange-Server-2019-CU5"||app="Microsoft-Exchange-Server-2019-CU3"||app="Microsoft-Exchange-Server-2019-Preview"||app="Microsoft-Exchange-Server-2019-CU8"||app="Microsoft-Exchange-Server-2019-CU1"||app="Microsoft-Exchange-Server-2019-CU7"||app="Microsoft-Exchange-Server-2019-CU2"||app="Microsoft-Exchange-Server-2019-CU6"||app="Microsoft-Exchange-Server-2019-RTM"||app="Microsoft-Exchange-Server-2019-CU4"
microsoft exchange 2010:
app="Microsoft-Exchange-2010-POP3-server-version-03.1"||app="Microsoft-Exchange-Server-2010"
相关文章
|
3月前
|
Web App开发 测试技术 网络安全
Kali 测试:使用Burp Suite 对网络认证服务的攻击(一)
Kali 渗透测试:使用Burp Suite 对网络认证服务的攻击(一)
104 0
|
3月前
|
网络安全 数据安全/隐私保护 安全
Kali 测试:使用Burp Suite 对网络认证服务的攻击(二)
Kali 渗透测试:使用Burp Suite 对网络认证服务的攻击(二)
187 0
|
4月前
|
安全 网络协议 JavaScript
ARP病毒自动添加的网址利用ms07004EXP和MS0614EXP传播Worm.Win32.Delf.cc等
ARP病毒自动添加的网址利用ms07004EXP和MS0614EXP传播Worm.Win32.Delf.cc等
|
4月前
|
安全 网络协议
ARP病毒加的网址传播Trojan.PSW.Win32.OnlineGames.GEN等
ARP病毒加的网址传播Trojan.PSW.Win32.OnlineGames.GEN等
|
6月前
|
监控 安全 网络安全
初探rce中的无参数rce
无参数RCE虽然不常见,但其隐蔽性和潜在的破坏性使得它成为一种特别危险的安全威胁。防御这类攻击要求开发者和系统管理员具备深刻的安全意识和综合的安全策略。通过持续的安全培训、审计以及运用行业最佳实践,可以有效降低这类风险。安全是一个持续的过程,而不是一次性任务,面对日益复杂的安全威胁,持续的努力和关注是保障数字资产安全的关键。
72 1
|
8月前
|
安全 网络安全
谁还不会安装Burp Suite?
谁还不会安装Burp Suite?
141 1
|
安全 网络安全 PHP
TP-RCE绕过阿里云防护Getshell
TP-RCE绕过阿里云防护Getshell
297 1
|
安全 Java 数据安全/隐私保护
解决Fortify漏洞:Insecure Randomness(不安全随机数)
解决Fortify漏洞:Insecure Randomness(不安全随机数)
339 0
|
安全 算法 Linux
Cobalt Strike <=4.7 xss复现和NTLM V2窃取(不会RCE)
Cobalt Strike <=4.7 xss复现和NTLM V2窃取(不会RCE)
179 0
|
存储 开发框架 安全
CVE-2020-0688 exchange远程代码执行漏洞
CVE-2020-0688 exchange远程代码执行漏洞
188 0