exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/48168
This Metasploit module exploits CVE-2020-0688, a .NET deserialization vulnerability in Microsoft Exchange Server's ECP web page, allowing remote command execution as NT_AUTHORITY\SYSTEM due to fixed cryptographic keys.
Classification
Working Poc 100%
Target:
Microsoft Exchange Server (versions with fixed cryptographic keys)
Auth required
Prerequisites:
Valid credentials for Exchange Server · Network access to the ECP web interface
exploitdb
WORKING POC
by Photubias · pythonremotewindows
https://www.exploit-db.com/exploits/48153
This exploit leverages CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange Server, to achieve authenticated remote code execution. It crafts a malicious payload using a known static key and sends it to the target server via a legitimate session.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2010 SP3 to 2019 CU4
Auth required
Prerequisites:
Valid credentials for the target Exchange server · Network access to the Exchange server
nomisec
WORKING POC
356 stars
by zcgonvh · poc
https://github.com/zcgonvh/CVE-2020-0688
This is a functional exploit for CVE-2020-0688, targeting Microsoft Exchange's deserialization vulnerability in the MachineKeySection. It includes authentication, session handling, and payload execution capabilities.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (versions affected by CVE-2020-0688)
Auth required
Prerequisites:
Valid Exchange credentials · Network access to the target Exchange server
nomisec
WORKING POC
330 stars
by Ridter · remote-auth
https://github.com/Ridter/cve-2020-0688
This repository contains a functional exploit for CVE-2020-0688, a remote code execution vulnerability in Microsoft Exchange Server. The exploit includes detection and exploitation scripts, leveraging deserialization to achieve RCE.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (versions with BuildNumber >= 15)
Auth required
Prerequisites:
Valid credentials for OWA login · Access to the ECP endpoint
nomisec
STUB
166 stars
by random-robbie · poc
https://github.com/random-robbie/cve-2020-0688
This repository contains a stub exploit for CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange. The exploit.py script is incomplete and untested, while the README provides manual steps to exploit the vulnerability using ysoserial.net.
Attack Type
Deserialization
Target:
Microsoft Exchange Server
Auth required
Prerequisites:
Valid Exchange user credentials · Access to the ECP interface · __VIEWSTATEGENERATOR and ASP.NET_SessionId values
nomisec
WORKING POC
146 stars
by Yt1g3r · remote-auth
https://github.com/Yt1g3r/CVE-2020-0688_EXP
This is a functional exploit for CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange Server. It leverages ysoserial to generate a malicious ViewState payload and triggers it via authenticated ECP access.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Microsoft Exchange Server 2010, 2013, 2016, 2019 (pre-patch)
Auth required
Prerequisites:
Valid Exchange credentials · Access to ECP endpoint · ysoserial.exe in specified path
nomisec
WORKING POC
66 stars
by Jumbo-WJB · poc
https://github.com/Jumbo-WJB/CVE-2020-0688
This PoC exploits CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange Server, by leveraging ysoserial to generate a malicious ViewState payload for remote code execution. It requires authentication and interacts with the Exchange Control Panel (ECP) to trigger the exploit.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Microsoft Exchange Server (versions affected by CVE-2020-0688)
Auth required
Prerequisites:
Valid credentials for the target Exchange server · Access to ysoserial for payload generation · Network access to the target ECP endpoint
nomisec
SCANNER
38 stars
by onSec-fr · poc
https://github.com/onSec-fr/CVE-2020-0688-Scanner
This is a C# scanner tool designed to check for CVE-2020-0688 vulnerability in Microsoft Exchange Server by passively scraping version information from HTML content. It processes a list of hosts and categorizes them based on their vulnerability status.
Classification
Scanner 95%
Target:
Microsoft Exchange Server (2003, 2007, 2010, 2013, 2016, 2019)
No auth needed
Prerequisites:
List of target hosts (IPs, hostnames, or FQDNs) · Network access to the Exchange servers
nomisec
WORKING POC
24 stars
by w4fz5uck5 · remote-auth
https://github.com/w4fz5uck5/cve-2020-0688-webshell-upload-technique
This is a Python-based exploit for CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange Server. It uploads an ASPX webshell to achieve remote code execution by leveraging a crafted payload that bypasses VIEWSTATE validation.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (versions affected by CVE-2020-0688)
Auth required
Prerequisites:
Valid credentials for Exchange Server · Network access to the target Exchange Server
nomisec
WORKING POC
22 stars
by MrTiz · remote-auth
https://github.com/MrTiz/CVE-2020-0688
This PowerShell script exploits CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange Server, by leveraging fixed cryptographic keys to achieve remote code execution. It authenticates to the Exchange Control Panel (ECP), generates a malicious ViewState payload using ysoserial, and sends it to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (versions affected by CVE-2020-0688)
Auth required
Prerequisites:
Valid credentials for Exchange Server · Access to ysoserial.exe and NDesk.Options.dll · Network access to the target ECP endpoint
nomisec
WORKING POC
16 stars
by W01fh4cker · remote-auth
https://github.com/W01fh4cker/CVE-2020-0688-GUI
This is a GUI-based exploit for CVE-2020-0688, a remote code execution vulnerability in Microsoft Exchange Server. The exploit leverages deserialization flaws in the Exchange Control Panel (ECP) to execute arbitrary commands or shellcode.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013, 2016, 2019
Auth required
Prerequisites:
Valid credentials for Exchange Server · Network access to the target server
nomisec
WORKING POC
11 stars
by zyn3rgy · remote-auth
https://github.com/zyn3rgy/ecp_slap
This repository contains a Go-based proof-of-concept exploit for CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange Server. It includes scanning, payload generation, and exploitation functionalities.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (on-premises)
Auth required
Prerequisites:
Valid credentials for Exchange ECP · Vulnerable Exchange build · Network access to ECP
nomisec
WORKING POC
11 stars
by ravinacademy · poc
https://github.com/ravinacademy/CVE-2020-0688
This is a PowerShell script that exploits CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange. It generates a malicious __VIEWSTATE payload to achieve remote code execution by leveraging the TextFormattingRunPropertiesMarshal class.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (versions affected by CVE-2020-0688)
No auth needed
Prerequisites:
Access to a vulnerable Microsoft Exchange instance · Ability to send crafted requests to the target
nomisec
WORKING POC
10 stars
by youncyb · poc
https://github.com/youncyb/CVE-2020-0688
This PoC exploits CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange Server, by leveraging ysoserial to generate a malicious ViewState payload. It authenticates to the target, retrieves session keys, and executes arbitrary commands via deserialization.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Microsoft Exchange Server 2016/2019
Auth required
Prerequisites:
Valid Exchange credentials · Network access to Exchange server · ysoserial.exe in the Release directory
nomisec
SCANNER
8 stars
by cert-lv · poc
https://github.com/cert-lv/CVE-2020-0688
This repository contains a scanner to identify Microsoft Exchange servers vulnerable to CVE-2020-0688, a static key vulnerability leading to SYSTEM-level RCE. It checks for open ports and Exchange versions but does not include an exploit payload.
Classification
Scanner 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to target Exchange servers · Ports 25 and 443 accessible
nomisec
WORKING POC
5 stars
by justin-p · poc
https://github.com/justin-p/PSForgot2kEyXCHANGE
This PowerShell script exploits CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange Server due to static cryptographic keys. It authenticates with valid credentials, generates a malicious ViewState payload using ysoserial.net, and executes arbitrary commands under SYSTEM privileges via the Exchange Control Panel.
Classification
Working Poc 100%
Target:
Microsoft Exchange Server (pre-patch for CVE-2020-0688)
Auth required
Prerequisites:
Valid Exchange user credentials · Access to ysoserial.net executable · Network access to target Exchange server
nomisec
WORKING POC
4 stars
by murataydemir · remote-auth
https://github.com/murataydemir/CVE-2020-0688
This PoC demonstrates CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange Server due to fixed cryptographic keys. It leverages YSoSerial.net to generate a malicious ViewState payload for remote code execution (RCE) with SYSTEM privileges.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (versions affected by CVE-2020-0688)
Auth required
Prerequisites:
Authenticated access to Exchange Server · Valid ASP_NET_SessionId and __VIEWSTATEGENERATOR values · YSoSerial.net for payload generation
nomisec
WORKING POC
3 stars
by ktpdpro · poc
https://github.com/ktpdpro/CVE-2020-0688
This is a Python-based exploit for CVE-2020-0688, a remote command injection vulnerability. It establishes a reverse shell by sending a crafted payload to the target system.
Classification
Working Poc 90%
Target:
Microsoft Windows (specific version not specified)
No auth needed
Prerequisites:
Target IP address · Local IP and port for reverse shell
nomisec
WORKING POC
2 stars
by 1337-llama · remote-auth
https://github.com/1337-llama/CVE-2020-0688-Python3
This is a Python3 port of a CVE-2020-0688 exploit targeting Microsoft Exchange Server. It leverages a deserialization vulnerability with a hardcoded key to achieve authenticated remote code execution.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2010 SP3 to 2019 CU4
Auth required
Prerequisites:
Valid Exchange credentials · Network access to Exchange OWA
nomisec
WORKING POC
2 stars
by chudamax · remote-auth
https://github.com/chudamax/CVE-2020-0688-Exchange2010
This is a proof-of-concept exploit for CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange Server 2010. The code authenticates to the target, crafts a malicious ViewState payload, and checks for vulnerability by sending a crafted request to the Exchange server.
Classification
Working Poc 90%
Attack Type
Deserialization
Target:
Microsoft Exchange Server 2010
Auth required
Prerequisites:
valid credentials for the target Exchange server · network access to the target server
nomisec
SCANNER
2 stars
by righter83 · poc
https://github.com/righter83/CVE-2020-0688
This is a PHP-based scanner for CVE-2020-0688 that checks if Microsoft Exchange servers are running vulnerable versions by analyzing the OWA (Outlook Web Access) page. It does not exploit the vulnerability but identifies potentially vulnerable systems.
Classification
Scanner 100%
Target:
Microsoft Exchange Server (2010, 2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to the target Exchange server
nomisec
SCANNER
2 stars
by SLSteff · poc
https://github.com/SLSteff/CVE-2020-0688-Scanner
This repository contains a scanner for CVE-2020-0688, which checks for vulnerable Microsoft Exchange servers by enumerating versions via the Outlook Web Access page. It uses masscan to identify open ports and then checks the version to determine vulnerability status.
Classification
Scanner 95%
Target:
Microsoft Exchange Server (versions prior to February 11, 2020)
No auth needed
Prerequisites:
masscan installed · network access to target systems
nomisec
WORKING POC
2 stars
by mahyarx · poc
https://github.com/mahyarx/Exploit_CVE-2020-0688
This is a PowerShell script that exploits CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange. It generates a malicious __VIEWSTATE payload to achieve remote code execution by leveraging the Microsoft.PowerShell.Editor.dll assembly.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Microsoft Exchange Server (versions affected by CVE-2020-0688)
No auth needed
Prerequisites:
Access to a vulnerable Microsoft Exchange instance · Ability to send crafted HTTP requests to the target
nomisec
WORKING POC
1 stars
by truongtn · poc
https://github.com/truongtn/cve-2020-0688
This PoC exploits CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange Server, by generating a malicious ViewState payload using ysoserial.exe and sending it to the target server. The payload executes an arbitrary command (e.g., writing a file) via the ECP interface.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013, 2016, 2019
Auth required
Prerequisites:
Valid ASP.NET session ID · Access to ysoserial.exe · Network access to the target Exchange server
nomisec
WRITEUP
by iamwajd · poc
https://github.com/iamwajd/Cyber-Attack-Analysis
This repository provides a detailed technical analysis of the Virgin Mobile KSA breach, focusing on the exploitation of CVE-2020-0688 in unpatched Microsoft Exchange servers. It includes attack methodology, strategic failures, and proposed defense mechanisms.
Classification
Writeup 90%
Target:
Microsoft Exchange Server
No auth needed
Prerequisites:
Unpatched Microsoft Exchange Server · Internal network access
nomisec
WORKING POC
by tvdat20004 · remote-auth
https://github.com/tvdat20004/CVE-2020-0688
This is a functional exploit for CVE-2020-0688, leveraging deserialization via ysoserial.net to achieve remote code execution on vulnerable Microsoft Exchange servers. It includes options for vulnerability checking, file upload, and reverse shell execution.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (versions <= 14.3.496.0, 15.0.1497.2, 15.1.1913.5, 15.2.529.5)
Auth required
Prerequisites:
Valid Exchange credentials · ysoserial.net binary · Network access to target Exchange server
nomisec
WORKING POC
by 7heKnight · remote-auth
https://github.com/7heKnight/CVE-2020-0688
This repository contains a functional proof-of-concept exploit for CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange Server. The exploit leverages a crafted ViewState to achieve remote code execution (RCE) by deserializing malicious objects.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (versions affected by CVE-2020-0688)
Auth required
Prerequisites:
Valid credentials for Exchange Server · Access to the ECP (Exchange Control Panel) endpoint
metasploit
WORKING POC
EXCELLENT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/exchange_ecp_viewstate.rb
This Metasploit module exploits a .NET deserialization vulnerability in Microsoft Exchange Server's ECP web page (CVE-2020-0688) by crafting a malicious ViewState to achieve remote code execution as NT_AUTHORITY\SYSTEM.
Classification
Working Poc 100%
Target:
Microsoft Exchange Server (versions affected by CVE-2020-0688)
Auth required
Prerequisites:
Valid credentials for Exchange Server · Network access to the ECP web interface
patchapalooza
WORKING POC
by mirrors_zcgonvh · poc
https://gitee.com/mirrors_zcgonvh/CVE-2020-0688
This repository contains functional exploit code for CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange. It includes both detection and exploitation tools, with the exploit capable of executing commands and shellcode on vulnerable systems.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Microsoft Exchange Server
Auth required
Prerequisites:
valid credentials for the target Exchange server · network access to the Exchange server
patchapalooza
WORKING POC
by Ken-Abruzzi · remote-auth
https://github.com/Ken-Abruzzi/cve_2020_0688
This repository contains a functional exploit for CVE-2020-0688, a remote code execution vulnerability in Microsoft Exchange Server. The exploit leverages deserialization in the Exchange Control Panel (ECP) to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (versions affected by CVE-2020-0688)
Auth required
Prerequisites:
Valid credentials for Exchange Server · Access to the ECP endpoint
patchapalooza
WORKING POC
by sh3llsas · poc
https://gitee.com/sh3llsas/CVE-2020-0688_EXP
This repository contains a functional exploit for CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange Server. The exploit leverages ysoserial to generate a malicious payload and executes arbitrary commands via crafted ViewState parameters.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Microsoft Exchange Server (versions affected by CVE-2020-0688)
Auth required
Prerequisites:
valid credentials for Exchange Server · access to ysoserial tool
patchapalooza
WORKING POC
by kevin66654 · poc
https://gitee.com/kevin66654/Exchange-EXP-CVE-2020-0688
This repository contains a functional exploit for CVE-2020-0688, a deserialization vulnerability in Microsoft Exchange Server. The exploit leverages ysoserial to generate a malicious ViewState payload, which is then sent to the target server to achieve remote code execution.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server
Auth required
Prerequisites:
valid credentials for the target Exchange server · ysoserial tool for payload generation