@c3l3si4n
celesian
3 years
Today, me and @thau0x01 managed to develop a working PoC code for the new ProxyLogon (CVE-2021-26855) Microsoft Exchange 2019 vulnerability containing a full SSRF to Arbitrary File Write exploit chain. I also have to thank PRIDE Security for the support in this journey. :)
Tweet media one
Tweet media two
5
10
72

Replies

@SpectreRusinian
spectre
3 years
@c3l3si4n @thau0x01 how to get canary with headers msExchTargetMailBox and msExchLogonAccount?
2
0
1
@c3l3si4n
celesian
3 years
@lotusdll @thau0x01 it's all in the code
0
0
1
@PizazzJazz
jazzpizazz
3 years
@c3l3si4n @thau0x01 I like this a lot
0
0
1
@d4rksorcerer
ffxvi
3 years
@c3l3si4n @thau0x01 naum intendi nada man
0
0
2