ProxyShell
ProxyShell copied to clipboard
ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)
File "C:\Downloads\ProxyShell-main\exploit.py", line 119, in exploit_stage3 payload = payload_1 + fuzz.encode() + payload_2 AttributeError: 'int' object has no attribute 'encode'
└─# python3 exploit.py ***.***.***.*** [email protected] [Stage 1] Performing SSRF attack against Autodiscover [Stage 2] Performing malformed SSRF attack to obtain Security ID (SID) using endpoint /mapi/emsmdb against ***.***.***.*** [Stage 2]...
Hi, Thank you for your effort! When I try this against Exchange 2019 CU 8 (which is vulnerable), the exploit seem to work up to the point "[Stage 4] Dealing...