NA

CVE-2022-41082

Published: 03/10/2022 Updated: 20/12/2023
CVSS v3 Base Score: 8 | Impact Score: 5.9 | Exploitability Score: 2.1
VMScore: 0

Vulnerability Summary

Microsoft Exchange Server Remote Code Execution Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft exchange server 2013

microsoft exchange server 2016

microsoft exchange server 2019

Exploits

This Metasploit module chains two vulnerabilities on Microsoft Exchange Server that, when combined, allow an authenticated attacker to interact with the Exchange Powershell backend (CVE-2022-41040), where a deserialization flaw can be leveraged to obtain code execution (CVE-2022-41082) This exploit only supports Exchange Server 2019 These vulnera ...

Github Repositories

Python implementation for NotProxyShell aka CVE-2022-40140 & CVE-2022-41082

NotProxyShellScanner Python implementation for NotProxyShell aka CVE-2022-40140 & CVE-2022-41082 Setup Install the requirements all that's required is python3 requests pip3 install -r requirementstxt Running There are a few options when it comes to running the tooling: usage: NotProxyShellpy [-h] [-u TARGETHOST] [-f TARGE

0day-rce-september-2022 CVE identifiers: CVE-2022-41040 CVE-2022-41082 Very crude and quickly written scripts to scan if there are any webshells on your Exchange server related to the 0day RCE as mentioned here: gteltscvn/blog/warning-new-attack-campaign-utilized-a-new-0day-rce-vulnerability-on-microsoft-exchange-server-12715html#:~:text=Temporary%20containment%20m

ProxyNotShell-Scanner CVE-2022-41082 and CVE-2022-41040 Scanner Enjoy

Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability

nse-exchange Nmap NSE scripts to check against exchange vulnerability (CVE-2022-41082) NSE scripts check most popular exposed services on the Internet It is basic script which checks if virtual patching works Examples Since, there is no patch currently - only workarounds are checked if host is vulnerable Simple Example: nmap -sV -T4 -v --script=http-vuln-cve-2022 scanmenma

CVE-2022-41080 Desc CrowdStrike recently discovered a new exploit method (called OWASSRF) consisting of CVE-2022-41080 and CVE-2022-41082 to achieve remote code execution (RCE) through Outlook Web Access (OWA) The new exploit method bypasses URL rewrite mitigations for the Autodiscover endpoint provided by Microsoft in response to ProxyNotShell The discovery was part of rece

Working PoC for CVE-2022-41040 and CVE-2022-41082 (AKA ProxyNotShell) Requirement: pip install requests_ntlm2 requests Usage: python poc_aug3py <host> <username> <password> <command> Creds: ProxyShell PoC script from: blogviettelcybersecuritycom/pwn2own-2021-microsof

PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers

CVE-2022-41082-POC PoC for the CVE-2022-41082 NotProxyShell OWASSRF Vulnerability Effecting Microsoft Exchange Servers This is Post-Auth RCE for ProxyNotShell OWASSRF, valid cardentials are needed for command execution Added the Powershell PoC script for TabShell Vulnerability (CVE-2022-41076) The TabShell vulnerability its a form of Privilege Escalation which allows breaking

Microsoft Exchange Server Remote Code Execution Vulnerability.

UPDATED VERSION ALLOWS FOR HTTPS CHECK AS WELL exchange-vuln-checknse FOR HTTP: nmap -p80 <target-ip> --script exchange-vuln-checknse FOR HTTPS: nmap -p443 <target-ip> --script exchange-vuln-checknse SAVE RESULTS IN A FILE nmap -p80 <target-ip> --script exchange-vuln-checknse -oN resultstxt http-vuln-CVE-2022-41082 Microsoft Exchan

CVE-2022-41082-POC PoC for the CVE-2022-41082 NotProxyShell OWASSRF Vulnerability Effecting Microsoft Exchange Servers This is Post-Auth RCE for ProxyNotShell OWASSRF, valid cardentials are needed for command execution Added the Powershell PoC script for TabShell Vulnerability (CVE-2022-41076) The TabShell vulnerability its a form of Privilege Escalation which allows breaking

https & http

vuln-CVE-2022-41082 https & http FOR HTTP: nmap -p80 <target-ip> --script exchange-vuln-checknse FOR HTTPS: nmap -p443 <target-ip> --script exchange-vuln-checknse SAVE RESULTS IN A FILE nmap -p80 <target-ip> --script exchange-vuln-checknse -oN resultstxt

Exchange学习 整理和自己写了一些exchange的脚本 CheckInfo 基于exchange版本和补丁日期检测漏洞 版本识别 通过 owa 接口,获取短版本信息 通过 /ecp/Current/exporttool/microsoftexchangeediscoveryexporttoolapplication 接口获取完整版本信息 通过 /owa/service, /owa 接口响应头 X-OWA-Version获取完整版本 爆破 /ec

PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers

CVE-2022-41082-POC PoC for the CVE-2022-41082 NotProxyShell OWASSRF Vulnerability Effecting Microsoft Exchange Servers This is Post-Auth RCE for ProxyNotShell OWASSRF, valid cardentials are needed for command execution Added the Powershell PoC script for TabShell Vulnerability (CVE-2022-41076) The TabShell vulnerability its a form of Privilege Escalation which allows breaking

PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers

CVE-2022-41082-POC PoC for the CVE-2022-41082 NotProxyShell OWASSRF Vulnerability Effecting Microsoft Exchange Servers This is Post-Auth RCE for ProxyNotShell OWASSRF, valid cardentials are needed for command execution Added the Powershell PoC script for TabShell Vulnerability (CVE-2022-41076) The TabShell vulnerability its a form of Privilege Escalation which allows breaking

Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082

NotProxyShellHunter Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082

Script to check for IOC's created by ProxyNotShell (CVE-2022-41040 & CVE-2022-41082)

proxynotshell-IOC-Checker Powershell script used to check for IOC's for CVE-2022-41040 and CVE-2022-41082 based on community research and Microsoft: GTESC The Sec Master Double Puslar Microsoft Security Resource Center Microsoft Security Blog The script may be updated to include more IOC's as more information is made available ⬇️ Download git clone gith

Recent Articles

Play Ransomware Group Using New Custom Data-Gathering Tools
Symantec Threat Intelligence Blog • Threat Hunter Team • 19 Apr 2024

Tools allow attackers to harvest data typically locked by the operating system.

Posted: 19 Apr, 20236 Min ReadThreat Intelligence SubscribeFollowtwitterlinkedinPlay Ransomware Group Using New Custom Data-Gathering ToolsTools allow attackers to harvest data typically locked by the operating system.The Play ransomware group is using two new, custom-developed tools that allow it to enumerate all users and computers on a compromised network, and copy files from the Volume Shadow Copy Service (VSS) that are normally locked by the operati...

CVE-2022-41040 and CVE-2022-41082 – zero-days in MS Exchange
Securelist • Vitaly Morgunov • 19 Dec 2022

Summary At the end of September, GTSC reported an attack on critical infrastructure that took place in August. During the investigation, experts found that two 0-day vulnerabilities in Microsoft Exchange Server were used in the attack. The first one, later identified as CVE-2022-41040, is a server-side request forgery (SSRF) vulnerability that allows an authenticated attacker to remotely trigger the next vulnerability – CVE-2022-41082. The second vulnerability, in turn, allows remote code exec...

IT threat evolution in Q3 2022. Non-mobile statistics
Securelist • AMR • 18 Nov 2022

IT threat evolution in Q3 2022 IT threat evolution in Q3 2022. Non-mobile statistics IT threat evolution in Q3 2022. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q3 2022: Kaspersky solutions blocked 956,074,958 attacks from online resources across the globe. Web Anti-Virus recognized 251,288,987...

Rackspace blames ransomware woes on zero-day attack
The Register

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Play gang blamed, ProxyNotShell cleared and hosted Exchange doomed

Rackspace has confirmed the Play ransomware gang was behind last month's hacking and said it won't bring back its hosted Microsoft Exchange email service, as it continues working to recover customers' email data lost in the December 2 ransomware attack. Rackspace said "more than half" of its customers who lost their hosted email service last month now have "some or all of their data available to them for download," in its latest and final status update, posted today. But customers aren't exactly...

Atlassian, Microsoft bugs on CISA’s must-patch list after exploitation spree
The Register

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Some days, security just feels like a total illusion. OK, most days...

A recently disclosed critical vulnerability in Atlassian's Bitbucket is actively being exploited, according to the US government. The Cybersecurity and Infrastructure Security Agency (CISA) late on Friday placed the flaw – tracked as CVE-2022-36804 – on its catalog of Known Exploited Vulnerabilities (KEV), effectively a must-patch list. GreyNoise, a company that tracks and analyzes internet traffic, said it found evidence the security hole was being exploited in the wild. CISA put the vulner...

Microsoft, Intel lead this month's security fix emissions
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Downfall processor leaks, Teams holes, VPN clients at risk, and more

Patch Tuesday Microsoft's August patch party seems almost boring compared to the other security fires it's been putting out lately. Of the almost 90 flaws addressed today, two are listed as being under active exploitation. Redmond deemed six of the August CVE-tagged bugs as critical, though we note there are 26 vulnerabilities that can lead to remote code execution (RCE). One of the two that miscreants have already found and exploited doesn't yet have a patch. The advisory for that flaw, ADV2300...

Electoral Commission had internet-facing server with unpatched vuln
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources ProxyNotShell vulnerability could be how UK body got pwned, suggests infosec expert

The hacking of the UK’s Electoral Commission was potentially facilitated by the exploitation of a vulnerability in Microsoft Exchange, according to a security expert. Earlier this week, the election oversight body disclosed that its systems had been broken into, and the attackers had access to the servers that host the organization's email, as well as copies of the electoral registers for the entire UK. It appears the Electoral Commission was running Microsoft Exchange Server with Outlook Web ...

It’s Patch Tuesday and still no fix for ProxyNotShell Microsoft Exchange holes
The Register

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources And for bonus points, there's a Windows flaw under active exploit

Patch Tuesday Microsoft fixed more than 80 security flaws in its products for October's Patch Tuesday. But let's start off with what Redmond didn't fix: two Exchange Server bugs dubbed ProxyNotShell that have been exploited by snoops as far back as August. CVE-2022-41040 is a server-side request forgery vulnerability while CVE-2022-41082 is a remote code execution (RCE) bug. Both can be exploited together to run PowerShell commands on a vulnerable system and take control of it. Vietnamese cybers...