Exchange Control Panel Viewstate Deserialization
Posted by deepcore on March 5, 2020 – 9:18 am
This Metasploit module exploits a .NET serialization vulnerability in the Exchange Control Panel (ECP) web page. The vulnerability is due to Microsoft Exchange Server not randomizing the keys on a per-installation basis resulting in them using the same validationKey and decryptionKey values. With knowledge of these, values an attacker can craft a special viewstate to cause an OS command to be executed by NT_AUTHORITYSYSTEM using .NET deserialization.
Post a reply
You must be logged in to post a comment.