Skip to content

aravazhimdr/ProxyShell-POC-Mod

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

ProxyShell-POC-Mod

A Proof of Concept for ProxyShell (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) vulnerability. This exploit code is a merge of two POC. They both had pros & cons; So I merged them. Credits to @donnymaasland (https://github.com/dmaasland/proxyshell-poc) & @ber_m1ng (https://github.com/ktecv2000/ProxyShell)

Motivation

I used both the above POC's in my lab. But I had some issues with them.

  • @donnymaasland's version had a proxy which gave me back so much delay and errors
  • @ber_m1ng's version don't use EWS to put payload in Draft, Instead it sent payload via mail to inbox.
  • To learn more about ProxyShell I decided to merge those codes; And it worked

What's new?

  • X-Anchormailbox header for Exchange 2016 support

Installation

git clone https://github.com/aravazhimdr/ProxyShell-POC-Mod.git
cd ProxyShell-POC-Mod
virtualenv -p $(which python3) venv
source venv/bin/activate
pip3 install pypsrp requests
cp wsman.py venv/lib/*/site-packages/pypsrp/wsman.py

Note: This POC uses modified version of wsman.py from @ber_m1ng

Usage

python3 proxyshell_mod.py -u exchange-url -e email@lab.local

Credits & Thanks

Reference

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages