9.1 CVE-2021-34473

CISA Kev Catalog Used by Malware Used by Ransomware Patch Exploit
 

Microsoft Exchange Server Remote Code Execution Vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2021-34473

Categories

CWE-918 : Server-Side Request Forgery (SSRF)
By providing URLs to unexpected hosts or ports, attackers can make it appear that the server is sending the request, possibly bypassing access controls such as firewalls that prevent the attackers from accessing the URLs directly. The server can be used as a proxy to conduct port scanning of hosts in internal networks, use other URLs such as that can access documents on the system (using file://), or use other protocols such as gopher:// or tftp://, which may provide greater control over the contents of requests.

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:*
cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*
cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:*
cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_8:*:*:*:*:*:*
cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_9:*:*:*:*:*:*


REMEDIATION


Patch

Url
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-3...


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
https://github.com/cyberheartmi9/Proxyshell-Scanner
https://github.com/p2-98/CVE-2021-34473
https://github.com/horizon3ai/proxyshell

Other Nist (github, ...)

Url
http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Rem...


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
664 Server Side Request Forgery
High