Temporarily removing this template

patch-1
sandeep 2021-04-22 09:46:29 +05:30
parent 584c39cdd0
commit 65b6c57e9f
1 changed files with 0 additions and 31 deletions

View File

@ -1,31 +0,0 @@
id: CVE-2021-28480
info:
name: Microsoft Exchange Server Remote Code Execution detection
author: madrobot
severity: critical
description: CVE-2021-28480 & CVE-2021-28481 received a CVSS score of 9.8 which is remarkably high. Both of these have 'Network' as attack vector, which means the attack can be executed remotely and the exploit might potentially be wormable.
tags: cve,cve2021,rce,exchange
reference: |
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28480
- https://khonggianmang.vn/check-proxynotfound/en
requests:
- raw:
- |
GET /ews/exchange.asmx HTTP/1.1
Host: {{Hostname}}
Authorization: NTLM TlRMTVNTUAABAAAABoIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMAAAAAAAMAA=
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
matchers-condition: and
matchers:
- type: regex
regex:
- "NTLM .+"
part: header
- type: dsl
dsl:
- "contains(tolower(all_headers), 'www-authenticate') && status_code == 401"