Skip to content

Commit

Permalink
Add more words about Exchange role groups
Browse files Browse the repository at this point in the history
  • Loading branch information
wvu committed Sep 16, 2020
1 parent e118ff1 commit 03e0b90
Show file tree
Hide file tree
Showing 2 changed files with 12 additions and 0 deletions.
Expand Up @@ -8,6 +8,12 @@ required to exploit this vulnerability. Additionally, the target user
must have the `Data Loss Prevention` role assigned and an active
mailbox.

If the user is in the `Compliance Management` or greater `Organization
Management` role groups, then they have the `Data Loss Prevention`
role. Since the user who installed Exchange is in the `Organization
Management` role group, they transitively have the `Data Loss
Prevention` role.

The specific flaw exists within the processing of the `New-DlpPolicy`
cmdlet. The issue results from the lack of proper validation of
user-supplied template data when creating a DLP policy. An attacker
Expand Down
6 changes: 6 additions & 0 deletions modules/exploits/windows/http/exchange_ecp_dlp_policy.rb
Expand Up @@ -23,6 +23,12 @@ def initialize(info = {})
must have the "Data Loss Prevention" role assigned and an active
mailbox.
If the user is in the "Compliance Management" or greater "Organization
Management" role groups, then they have the "Data Loss Prevention"
role. Since the user who installed Exchange is in the "Organization
Management" role group, they transitively have the "Data Loss
Prevention" role.
The specific flaw exists within the processing of the New-DlpPolicy
cmdlet. The issue results from the lack of proper validation of
user-supplied template data when creating a DLP policy. An attacker
Expand Down

0 comments on commit 03e0b90

Please sign in to comment.