9.1 CVE-2021-34473
CISA Kev Catalog Used by Malware Used by Ransomware Patch Exploit
Microsoft Exchange Server Remote Code Execution Vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2021-34473
Categories
CWE-918 : Server-Side Request Forgery (SSRF)
By providing URLs to unexpected hosts or ports, attackers can make it appear that the server is sending the request, possibly bypassing access controls such as firewalls that prevent the attackers from accessing the URLs directly. The server can be used as a proxy to conduct port scanning of hosts in internal networks, use other URLs such as that can access documents on the system (using file://), or use other protocols such as gopher:// or tftp://, which may provide greater control over the contents of requests.
References
secure@microsoft.com Patch Exploit
http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Rem... Exploit Third Party Advisory VDB Entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-3... Patch Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-821/ Third Party Advisory VDB Entry |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_8:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_9:*:*:*:*:*:* |
REMEDIATION
Patch
Url |
---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-3... |
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
https://github.com/cyberheartmi9/Proxyshell-Scanner |
https://github.com/p2-98/CVE-2021-34473 |
https://github.com/horizon3ai/proxyshell |
Other Nist (github, ...)
Url |
---|
http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Rem... |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
664 | Server Side Request Forgery |
High |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.