-
Notifications
You must be signed in to change notification settings - Fork 14k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Updates for Exchange ECP DLP Policy Exploit #14607
Updates for Exchange ECP DLP Policy Exploit #14607
Conversation
Thanks for updating this module @zeroSteiner! I successfully tested against Exchange Server version 15.1.2176 on Windows server 2016. I have a few comments:
Adding
|
In commit 1f5f086, I required faker as you suggested and utilized it more to generate a random publisher and description. |
@msjenkins-r7 test this please. |
Thanks for updating the code @zeroSteiner ! Everything is good now. I'll go ahead and land it. Here is the output against Exchange version 15.1.2176 on Windows server 2016 :
|
Release NotesUpdated the Exchange ECP DLP Policy module exploit to leverage a new technique which bypasses the original patch. This new technique also works on unpatched versions. |
Nice job! Thank you, all. |
This updates the
exchange_ecp_dlp_policy
module to leverage the technique disclosed today which bypasses the original patch. I updated the exploit logic to use the new technique after verifying the original did not work against Exchange Server 2016 CU19. After updating the exploit, I reverted back to my older version of Exchange and validated that it still worked, which it does so we can safely use the bypass technique as a one-size-fits all. The older version I tested was Exchange Server 2016 CU12. I also added a paragraph to the docs describing the relationships between the patches, updates and CVEs.The exploit and check method both work. The exploit does need to be authenticated and the user needs to have an admin privilege. I just used a domain admin account in my lab which was the easiest way to get the necessary privileges.
Tested on Exchange Server 2016 with CU19 released December 2020 (latest cumulative update).
Updates #14126.