严重 Microsoft Exchange Server 远程执行代码漏洞
CVE编号
CVE-2021-26855利用情况
漏洞武器化补丁情况
官方补丁披露时间
2021-03-02漏洞描述
Exchange Server 是微软公司的一套电子邮件服务组件,是个消息与协作系统。2021年03月3日,微软官方发布了Microsoft Exchange安全更新,披露了多个高危严重漏洞,其中: 1、在 CVE-2021-26855 Exchange SSRF漏洞中,攻击者可直接构造恶意请求,以Exchange server的身份发起任意HTTP请求,扫描内网,并且可获取Exchange用户信息。该漏洞利用无需身份认证。 2、在 CVE-2021-26857 Unified Messaging service 反序列化漏洞中,攻击者可构造恶意请求,触发反序列化漏洞,从而执行任意代码。成功利用该漏洞需要Exchange administrator权限,或需要配合其他漏洞。 3、在 CVE-2021-26858 / CVE-2021-27065 Exchange 任意文件写入漏洞中,攻击者可结合CVE-2021-26855 SSRF漏洞,或提供正确的administrator凭证,构造恶意请求,在系统上写入任意文件。解决建议
微软官方已针对该批漏洞发布相关安全更新补丁,可按照以下链接进行升级:CVE-2021-26855 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26855受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | microsoft | exchange_server | * | Up to (including) 2013 | |||||
运行在以下环境 | |||||||||
应用 | microsoft | exchange_server | * | Up to (including) 2016 | |||||
运行在以下环境 | |||||||||
应用 | microsoft | exchange_server | * | Up to (including) 2019 |
- 攻击路径 远程
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 漏洞武器化
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 传输被破坏
- 服务器危害 服务器失陷
- 全网数量 1000
CWE-ID | 漏洞类型 |
CWE-918 | 服务端请求伪造(SSRF) |
NVD-CWE-noinfo |
Exp相关链接
- https://github.com/0xAbdullah/CVE-2021-26855
- https://github.com/achabahe/CVE-2021-26855
- https://github.com/alt3kx/CVE-2021-26855_PoC
- https://github.com/cert-lv/exchange_webshell_detection
- https://github.com/charlottelatest/CVE-2021-26855
- https://github.com/conjojo/Microsoft_Exchange_Server_SSRF_CVE-2021-26855
- https://github.com/DCScoder/Exchange_IOC_Hunter
- https://github.com/dwisiswant0/proxylogscan
- https://github.com/h4x0r-dz/CVE-2021-26855
- https://github.com/hackerschoice/CVE-2021-26855
- https://github.com/hictf/CVE-2021-26855-CVE-2021-27065
- https://github.com/hosch3n/ProxyVulns
- https://github.com/Immersive-Labs-Sec/ProxyLogon
- https://github.com/jsdryan/CVE-2021-26855
- https://github.com/KotSec/CVE-2021-26855-Scanner
- https://github.com/mauricelambert/ExchangeWeaknessTest
- https://github.com/mekhalleh/exchange_proxylogon
- https://github.com/mil1200/ProxyLogon-CVE-2021-26855
- https://github.com/Mr-xn/CVE-2021-26855-d
- https://github.com/p0wershe11/ProxyLogon
- https://github.com/praetorian-inc/proxylogon-exploit
- https://github.com/pussycat0x/CVE-2021-26855-SSRF
- https://github.com/PwCNO-CTO/CVE-2021-26855
- https://github.com/r0ckysec/CVE-2021-26855-Exchange-RCE
- https://github.com/r0ckysec/CVE-2021-26855_Exchange
- https://github.com/raheel0x01/CVE-2021-26855
- https://github.com/RickGeex/ProxyLogon
- https://github.com/SCS-Labs/HAFNIUM-Microsoft-Exchange-0day
- https://github.com/sgnls/exchange-0days-202103
- https://github.com/shacojx/Scan-Vuln-CVE-2021-26855
- https://github.com/soteria-security/HAFNIUM-IOC
- https://github.com/srvaccount/CVE-2021-26855-PoC
- https://github.com/stressboi/hafnium-exchange-splunk-csvs
- https://github.com/TaroballzChen/ProxyLogon-CVE-2021-26855-metasploit
- https://github.com/Th3eCrow/CVE-2021-26855-SSRF-Exchange
- https://github.com/Udyz/CVE-2021-26855
- https://github.com/Yt1g3r/CVE-2021-26855_SSRF
- https://github.com/ZephrFish/Exch-CVE-2021-26855
- https://www.exploit-db.com/exploits/49637
- https://www.exploit-db.com/exploits/49663
- https://www.exploit-db.com/exploits/49879
- https://www.exploit-db.com/exploits/49895

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论