[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Microsoft Exchange Server Unpublished Pre-Authentication Remote Code Execution Exploit

[ 0Day-ID-36585 ]
Full title
Microsoft Exchange Server Unpublished Pre-Authentication Remote Code Execution Exploit [ Highlight ]
Highlight - is paid service, that can help to get more visitors to your material.

Price: 10
Date add
Category
Platform
Verified
Price
 
0.084 BTC

 
8 000 USD
Risk
[
Security Risk Critical
]
Rel. releases
Description
[Description]
First, IT'S NOT PROXYLOGON. IT'S NOT PROXYLOGON. IT'S NOT PROXYLOGON.
It's an unpublished vulnerability found by myself. It's not exploited in the wild and there's no exploit code on the Internet.

[About The Vulnerability]
It's a exploit chain utilizing pre-auth SSRF + post-auth EoP + post-auth file write to achieve pre-auth RCE on Exchange Server. The corresponding CVE numbers are:
- CVE-2021-28480, CVSS score 10
- CVE-2021-28481, CVSS score 10
- CVE-2021-28482, CVSS score 9

This exploit chain is not memory corruption bug so it's stable, easy to use, and no privilege required, the only limit is you must provide one victim's email as argument.

[Affect Versions]
- Exchange Server 2019 < 15.02.0858.010
- Exchange Server 2019 < 15.02.0792.013
- Exchange Server 2016 < 15.01.2242.008
- Exchange Server 2016 < 15.01.2176.012
- Exchange Server 2013 < 15.00.1497.015

Video: https://0day.today/videos/36585.mp4
Usage info
pip3 install -r requirements.txt
(I put requirements.txt in the head of exploit.py)

python3 exploit.py [target-exchange-ip] [victim email]
python3 exploit.py -h
Affected ver
Exchange Server 2019 < 15.02.0858.010
Exchange Server 2019 < 15.02.0792.013
Exchange Server 2016 < 15.01.2242.008
Exchange Server 2016 < 15.01.2176.012
Exchange Server 2013 < 15.00.1497.015
Prooves Information
Video proof
Other Information
Abuses
0
Comments
0
Views
16 979
We DO NOT use Telegram or any messengers / social networks! We DO NOT use Telegram or any messengers / social networks! Please, beware of scammers!
Please login or register to buy exploit.
OR
Buy incognito
0
0
Verified by 0day Admin
Verified by 0day Admin
This material is checked by Administration and absolutely workable.
Learn more about    GOLD:
0day.today Gold is the currency of 0day.today project and is denoted on this site as such image: . It used for paying for the services, buying exploits, earning money, etc
We accept:
BitCoin (BTC)
You can pay us via BTC
LiteCoin (LTC)
You can pay us via LTC
Ethereum (ETH)
You can pay us via ETH

Author
BL
29
Exploits
1
Readers
0
[ Comments: 0 ]
Terms of use of comments:
  • Users are forbidden to exchange personal contact details
  • Haggle on other sites\projects is forbidden
  • Reselling is forbidden
Punishment: permanent block of user account with all Gold.

Login or register to leave comments