Nettacker/nettacker/modules/vuln/msexchange_cve_2021_26855.yaml

52 lines
1.3 KiB
YAML

info:
name: msexchange_cve_2021_26855_vuln
author: OWASP Nettacker Team
severity: 9
description:
reference:
profiles:
- vuln
- http
- critical_severity
- msexchange
- cve
- cve2021
payloads:
- library: http
steps:
- method: get
timeout: 3
allow_redirects: false
headers:
User-Agent: "{user_agent}"
Cookie:
- "X-AnonResource=true; X-AnonResource-Backend=http://{target}/ecp/default.flt?~3;"
- "X-AnonResource=true; X-AnonResource-Backend=https://{target}/ecp/default.flt?~3;"
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/owa/auth/x.js"
prefix: ""
suffix: ""
interceptors:
data:
schema:
- "http"
- "https"
ports:
- 80
- 443
response:
condition_type: and
conditions:
status_code:
regex: 500|503
reverse: false
headers:
x-calculatedbetarget:
regex: localhost
reverse: false
content:
regex: NegotiateSecurityContext
reverse: false