关联漏洞
标题:
Microsoft Exchange Server 代码注入漏洞
(CVE-2022-23277)
描述:Microsoft Exchange Server是美国微软(Microsoft)公司的一套电子邮件服务程序。它提供邮件存取、储存、转发,语音邮件,邮件过滤筛选等功能。 Microsoft Exchange Server 存在代码注入漏洞。以下产品和版本受到影响:Microsoft Exchange Server 2013 Cumulative Update 23,Microsoft Exchange Server 2016 Cumulative Update 21,Microsoft Exchange
描述
将常用的cve工具做个备份(CVE-2021-42321,CVE-2022-23277,CVE-2022-41082,Exchange_GetVersion_MatchVul)
介绍
收藏的工具,来自以下
https://github.com/DarkSprings/CVE-2021-42321
https://github.com/7BitsTeam/CVE-2022-23277
https://github.com/3gstudent/Homework-of-Python
https://github.com/balki97/OWASSRF-CVE-2022-41082-POC
文件快照
[4.0K] /data/pocs/c7c18696314530042dbd3adb12192330a411ca9e
├── [4.0K] CVE-2021-42321
│ ├── [7.8K] CVE-2021-42321.py
│ └── [ 133] README.md
├── [4.0K] CVE-2022-23277
│ ├── [9.6K] cve-2022-23277.py
│ ├── [4.0K] images
│ │ └── [ 27K] qrcode.jpg
│ ├── [ 33K] ObjectDataProviderGenerator.cs
│ └── [ 510] README.md
├── [4.0K] Homework-of-Python
│ ├── [4.7K] aspxCmdNTLM.py
│ ├── [1.4K] BIG-IP_RunBash.py
│ ├── [6.4K] blind_XXEPlatform_CVE-2019-9670.py
│ ├── [ 18K] checkAutodiscoverEX.py
│ ├── [ 18K] checkAutodiscover.py
│ ├── [4.7K] checkEWS.py
│ ├── [1.2K] checkOWA.py
│ ├── [ 19K] eacManage.py
│ ├── [1.5K] easCheck.py
│ ├── [ 18K] ewsManage_Downloader.py
│ ├── [ 12K] ewsManage_exchangelib_Downloader.py
│ ├── [ 51K] ewsManage.py
│ ├── [ 16K] ewsManage_requests_ntlm_Downloader.py.py
│ ├── [ 16K] ewsManage_requests_ntlm_Session_Downloader.py
│ ├── [5.4K] ExchangeDeserializeShell-NoAuth-ActivitySurrogateSelectorFromFile.py
│ ├── [ 16K] ExchangeDeserializeShell-NoAuth-ghostfile.py
│ ├── [2.6K] ExchangeDeserializeShell-NoAuth-TextFormattingRunProperties.py
│ ├── [ 12K] Exchange_EWS_XML_Parser.py
│ ├── [1.4K] Exchange_GetInternalIP.py
│ ├── [ 12K] Exchange_GetVersion_MatchVul.py
│ ├── [3.0K] Exchange_GetVersion_ParseFromFile.py
│ ├── [2.9K] Exchange_GetVersion_ParseFromWebsite.py
│ ├── [4.8K] ExportFirefoxPassword.py
│ ├── [ 501] file_deduplication(For_urltoip).py
│ ├── [ 461] file_deduplication.py
│ ├── [ 757] fofa_api.py
│ ├── [ 771] fofa_api_VIP.py
│ ├── [2.8K] Fortigate_GetVersion.py
│ ├── [2.9K] get_Exchange_version.py
│ ├── [ 13K] ghostfile.cs
│ ├── [8.2K] imapManage.py
│ ├── [ 14K] MailEnableManage.py
│ ├── [5.0K] MinIO_GetVersion.py
│ ├── [9.6K] owaManage.py
│ ├── [ 752] phpStudy_5.2-5.45_(php_xmlrpc.dll)_backdoor_RCE.py
│ ├── [1.0K] portscan.py
│ ├── [1.1K] pptp_password_hack.py
│ ├── [ 13K] README.md
│ ├── [5.6K] SharpExchangeBackdoor.py
│ ├── [1.5K] SMBv3_RCE_Scanner(CVE-2020-0796).py
│ ├── [ 13K] SolarWindsOrionAPI_Manage.py
│ ├── [7.4K] SolarWindsOrion_Manage.py
│ ├── [4.5K] SophosUTM_ConfigParser.py
│ ├── [3.8K] SophosUTM_plxDecrypter.py
│ ├── [2.1K] sshCheck.py
│ ├── [3.2K] sshRunCmd.py
│ ├── [4.0K] Unauthenticated_RCE_in_Draytek_Vigor2960
│ │ └── [4.0K] 3900
│ │ └── [1.3K] 300B.py
│ ├── [ 750] urltoip.py
│ ├── [1.0K] vBulletin_5.x_0day_pre-auth_RCE.py
│ ├── [ 22K] vCenter_ExtraCertFromMdb.py
│ ├── [10.0K] vCenter_GenerateLoginCookie.py
│ ├── [7.7K] vCenterLDAP_Manage.py
│ ├── [2.0K] vRealizeOperationsManager_GetVersion.py
│ ├── [ 23K] vSphereAutomationAPI_Manage.py
│ ├── [ 19K] vSphereWebServicesAPI_Manage.py
│ ├── [3.1K] WebLogic_GetVersion.py
│ ├── [3.2K] Webmin_=1.920-Unauthenticated_RCE(CVE-2019-15107).py
│ ├── [5.6K] Zimbra_deserialization_RCE(CVE-2019-6980).py
│ ├── [4.0K] Zimbra_GetVersion.py
│ └── [ 97K] Zimbra_SOAP_API_Manage.py
├── [4.0K] OWASSRF-CVE-2022-41082-POC
│ ├── [ 59] cmd
│ ├── [5.3K] poc.py
│ ├── [4.0K] pypsrp
│ │ ├── [ 14K] client.py
│ │ ├── [ 61K] complex_objects.py
│ │ ├── [3.8K] encryption.py
│ │ ├── [3.9K] exceptions.py
│ │ ├── [ 44K] host.py
│ │ ├── [1.1K] index.html
│ │ ├── [ 958] __init__.py
│ │ ├── [ 37K] messages-bk.py
│ │ ├── [ 37K] messages.py
│ │ ├── [ 11K] negotiate.py
│ │ ├── [ 64K] powershell.py
│ │ ├── [4.0K] pwsh_scripts
│ │ │ ├── [5.2K] copy.ps1
│ │ │ ├── [1.9K] fetch.ps1
│ │ │ ├── [ 517] index.html
│ │ │ ├── [ 139] __init__.py
│ │ │ └── [4.0K] __pycache__
│ │ │ ├── [ 432] index.html
│ │ │ └── [ 150] __init__.cpython-36.pyc
│ │ ├── [ 0] py.typed
│ │ ├── [ 33K] serializer.py
│ │ ├── [ 16K] shell.py
│ │ ├── [3.5K] _utils.py
│ │ └── [ 45K] wsman.py
│ ├── [ 828] README.md
│ ├── [ 155] requirements.txt
│ └── [1.8K] TabShell.ps1
└── [ 222] README.md
10 directories, 94 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。