exploitdb
WORKING POC
by mekhalleh · rubywebappswindows
https://www.exploit-db.com/exploits/49895
This Metasploit module exploits CVE-2021-26855, an authentication bypass vulnerability in Microsoft Exchange Server, to download emails and contacts from a target mailbox without authentication. It leverages the ProxyLogon vulnerability to impersonate an admin and interact with the Exchange Web Services (EWS) API.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to the Exchange server · Valid email address of the target mailbox
exploitdb
WORKING POC
by Gonzalo Villegas · pythonwebappswindows
https://www.exploit-db.com/exploits/49879
This exploit leverages CVE-2021-26855 to perform unauthenticated email extraction from Microsoft Exchange servers (2013-2019) by abusing SSRF in the EWS API. It retrieves folder IDs, message IDs, and email content via crafted SOAP requests.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013-2019 (OWA)
No auth needed
Prerequisites:
Network access to Exchange server · EWS endpoint accessibility
exploitdb
WORKING POC
by F5 · pythonremotewindows
https://www.exploit-db.com/exploits/49663
This exploit leverages CVE-2021-26855 (ProxyLogon) to achieve unauthenticated RCE on Microsoft Exchange Server by abusing the Autodiscover endpoint to write a malicious ASPX webshell. The PoC demonstrates full exploitation, including privilege escalation and command execution.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013/2016/2019
No auth needed
Prerequisites:
Network access to Exchange Server · Exchange Server with vulnerable ProxyLogon endpoints
nomisec
WORKING POC
252 stars
by Flangvik · remote
https://github.com/Flangvik/SharpProxyLogon
SharpProxyLogon is a C# PoC for the ProxyLogon vulnerability chain (CVE-2021-26855), enabling RCE on Microsoft Exchange servers. It automates the exploitation process, including shellcode injection via TikiTorch and semi-interactive shell access.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to Exchange server · Valid email address on target server
nomisec
WORKING POC
177 stars
by hosch3n · remote
https://github.com/hosch3n/ProxyVulns
This repository contains a functional exploit for CVE-2021-26855, a server-side request forgery (SSRF) vulnerability in Microsoft Exchange Server. The exploit chain involves multiple steps to achieve remote code execution (RCE) by leveraging the SSRF to manipulate Exchange server configurations and deploy a webshell.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server
No auth needed
Prerequisites:
Network access to the Exchange server · Exchange server with vulnerable configuration
nomisec
SCANNER
163 stars
by dwisiswant0 · infoleak
https://github.com/dwisiswant0/proxylogscan
This repository contains a Go-based tool designed to scan for CVE-2021-26855, an authentication bypass vulnerability in Microsoft Exchange Server. The tool checks for the presence of the vulnerability by sending crafted HTTP requests and analyzing the response headers for specific indicators.
Classification
Scanner 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to the target Exchange Server
nomisec
WORKING POC
123 stars
by p0wershe11 · remote
https://github.com/p0wershe11/ProxyLogon
This repository contains a functional exploit for CVE-2021-26855, a critical SSRF vulnerability in Microsoft Exchange Server. The exploit leverages the ProxyLogon vulnerability to achieve remote code execution by crafting malicious requests to the Exchange Control Panel (ECP) endpoint.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013, 2016, 2019
No auth needed
Prerequisites:
Network access to the target Exchange Server · Exchange Server with vulnerable ECP endpoint
nomisec
WORKING POC
100 stars
by h4x0r-dz · infoleak
https://github.com/h4x0r-dz/CVE-2021-26855
This repository contains a functional Go-based exploit for CVE-2021-26855, a server-side request forgery (SSRF) vulnerability in Microsoft Exchange. The PoC includes functions to verify vulnerability existence, extract NTLM information, and enumerate user emails via crafted HTTP requests.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013, 2016, 2019
No auth needed
Prerequisites:
Network access to the target Exchange server · Valid target URL or domain name
nomisec
SCANNER
99 stars
by cert-lv · poc
https://github.com/cert-lv/exchange_webshell_detection
This repository contains a PowerShell script designed to detect webshells dropped on Microsoft Exchange servers compromised via CVE-2021-26855 and related vulnerabilities. It scans specific directories for suspicious files and known webshell patterns but does not exploit the vulnerability.
Classification
Scanner 100%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Access to the Exchange server file system · PowerShell execution privileges
nomisec
WORKING POC
61 stars
by hackerschoice · remote
https://github.com/hackerschoice/CVE-2021-26855
This repository contains a functional exploit for CVE-2021-26855, which is part of the ProxyLogon vulnerability chain affecting Microsoft Exchange Server. The exploit demonstrates an SSRF attack leading to arbitrary file write and potential remote code execution.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server
No auth needed
Prerequisites:
Network access to the target Exchange Server · Exchange Server vulnerable to CVE-2021-26855
nomisec
WORKING POC
53 stars
by alt3kx · infoleak
https://github.com/alt3kx/CVE-2021-26855_PoC
This repository contains functional exploit code for CVE-2021-26855, an SSRF vulnerability in Microsoft Exchange Server. The PoC demonstrates how to exploit the vulnerability to perform authenticated backend service requests, including extracting user details and profile photos.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2019
No auth needed
Prerequisites:
Network access to the Exchange Server · Valid email address of a user on the target server
nomisec
WORKING POC
51 stars
by praetorian-inc · remote
https://github.com/praetorian-inc/proxylogon-exploit
This repository contains a functional exploit for CVE-2021-26855 (ProxyLogon), which allows unauthenticated remote code execution on Microsoft Exchange servers. The exploit leverages SSRF and authentication bypass to inject a webshell.
Classification
Working Poc 100%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Valid email address on the target system · External URL to Exchange server
nomisec
WORKING POC
36 stars
by conjojo · infoleak
https://github.com/conjojo/Microsoft_Exchange_Server_SSRF_CVE-2021-26855
The repository contains a functional PoC for CVE-2021-26855, an SSRF vulnerability in Microsoft Exchange Server. The script uses crafted headers to trigger the vulnerability and checks for a 500 response with 'NegotiateSecurityContext' in the body to confirm exploitation.
Classification
Working Poc 90%
Target:
Microsoft Exchange Server 2013, 2016, 2019
No auth needed
Prerequisites:
Network access to the target Exchange Server
nomisec
WORKING POC
32 stars
by RickGeex · poc
https://github.com/RickGeex/ProxyLogon
This repository contains a functional exploit for CVE-2021-26855 (ProxyLogon), demonstrating an SSRF attack chain against Microsoft Exchange Server to achieve unauthenticated remote code execution. The exploit progresses through multiple stages to obtain FQDN, LegacyDN, SID, and ultimately delivers a payload.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013, 2016, 2019
No auth needed
Prerequisites:
Network access to the target Exchange server · Exchange server exposed to the internet
nomisec
WORKING POC
28 stars
by evilashz · remote
https://github.com/evilashz/ExchangeSSRFtoRCEExploit
This repository contains a functional exploit for CVE-2021-26855, a critical SSRF vulnerability in Microsoft Exchange Server that can be chained to achieve remote code execution (RCE). The exploit automates the attack chain, including authentication bypass, SSRF exploitation, and webshell upload.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013, 2016, 2019
No auth needed
Prerequisites:
Network access to vulnerable Exchange Server · Valid email address on the target server
nomisec
WORKING POC
27 stars
by ZephrFish · remote
https://github.com/ZephrFish/Exch-CVE-2021-26855
This repository contains a functional exploit for CVE-2021-26855, which is a Server-Side Request Forgery (SSRF) vulnerability in Microsoft Exchange Server that can be chained to achieve Remote Code Execution (RCE). The exploit automates the process of discovering the Exchange Server, obtaining necessary session tokens, and deploying a malicious ASPX shell.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013, 2016, 2019
No auth needed
Prerequisites:
Network access to the target Exchange Server · Valid email address on the target domain
nomisec
WORKING POC
22 stars
by hakivvi · remote
https://github.com/hakivvi/proxylogon
This repository contains a functional exploit for CVE-2021-26855, an SSRF vulnerability in Microsoft Exchange Server. The exploit leverages the ProxyLogon chain to achieve remote code execution (RCE) by dropping an ASPX webshell on the target server.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to the Exchange Server · Impacket library installed
nomisec
WORKING POC
22 stars
by pussycat0x · infoleak
https://github.com/pussycat0x/CVE-2021-26855-SSRF
This repository contains a functional Python script that exploits CVE-2021-26855, an SSRF vulnerability in Microsoft Exchange Server. The script sends a crafted HTTP request with specific headers and cookies to trigger the SSRF, using a Burp Collaborator domain for detection.
Classification
Working Poc 90%
Target:
Microsoft Exchange Server (versions affected by CVE-2021-26855)
No auth needed
Prerequisites:
Target Exchange Server accessible via HTTPS · Burp Collaborator domain for SSRF detection
nomisec
SCANNER
22 stars
by soteria-security · poc
https://github.com/soteria-security/HAFNIUM-IOC
This repository contains a PowerShell script designed to scan Exchange Server logs for indicators of compromise (IOCs) related to the Hafnium exploitation chain, including CVE-2021-26855. It does not exploit the vulnerability but detects potential exploitation attempts by analyzing log files for specific patterns.
Classification
Scanner 95%
Target:
Microsoft Exchange Server (versions affected by CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)
No auth needed
Prerequisites:
Access to Exchange Server log files · PowerShell execution privileges
nomisec
WORKING POC
17 stars
by srvaccount · infoleak
https://github.com/srvaccount/CVE-2021-26855-PoC
This repository contains a functional Go-based PoC for CVE-2021-26855, an SSRF vulnerability in Microsoft Exchange Server. The exploit leverages NTLM authentication and crafted HTTP requests to enumerate users and potentially access sensitive data.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to the Exchange Server · Exchange Server with vulnerable configuration
nomisec
WORKING POC
12 stars
by r0xDB · poc
https://github.com/r0xDB/CVE-2021-26855
This is a functional exploit for CVE-2021-26855 (ProxyLogon), which chains multiple vulnerabilities in Microsoft Exchange Server to achieve unauthenticated remote code execution. The PoC automates the exploitation process, including obtaining a session ID, bypassing authentication, and writing a malicious script to the server.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013, 2016, 2019
No auth needed
Prerequisites:
Network access to the Exchange Server · Exchange Server vulnerable to CVE-2021-26855
nomisec
WORKING POC
10 stars
by kh4sh3i · remote
https://github.com/kh4sh3i/ProxyLogon
This repository contains functional exploit code for CVE-2021-26855, a Microsoft Exchange Server authentication bypass vulnerability. It includes scripts for brute-forcing SIDs, checking vulnerability status, and achieving remote code execution by chaining with CVE-2021-27065.
Classification
Working Poc 95%
Attack Type
Auth Bypass, Rce
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Valid email address or brute-force list · Network access to target Exchange Server
nomisec
WORKING POC
9 stars
by mil1200 · remote
https://github.com/mil1200/ProxyLogon-CVE-2021-26855
This repository contains a functional Python exploit for CVE-2021-26855, a ProxyLogon vulnerability in Microsoft Exchange Server. The exploit chains multiple steps to achieve remote code execution (RCE) by leveraging authentication bypass and arbitrary file write vulnerabilities.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to vulnerable Exchange Server · Valid email address on the target server
nomisec
WORKING POC
8 stars
by thau0x01 · remote
https://github.com/thau0x01/poc_proxylogon
This repository contains a functional exploit for CVE-2021-26855, a ProxyLogon vulnerability in Microsoft Exchange Server. The PoC demonstrates arbitrary file write leading to remote code execution (RCE) by exploiting SSRF and authentication bypass flaws.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013/2016/2019
No auth needed
Prerequisites:
Network access to vulnerable Exchange Server · Valid email address for Autodiscover
nomisec
WORKING POC
6 stars
by Mr-xn · infoleak
https://github.com/Mr-xn/CVE-2021-26855-d
This repository contains a functional Python script that exploits CVE-2021-26855 (ProxyLogon) to check and download emails from vulnerable Microsoft Exchange servers. It leverages EWS (Exchange Web Services) SOAP requests to interact with mailboxes without authentication.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013, 2016, 2019 (pre-patch)
No auth needed
Prerequisites:
Network access to vulnerable Exchange server · List of target mailboxes
nomisec
WORKING POC
6 stars
by La3B0z · poc
https://github.com/La3B0z/CVE-2021-26855-SSRF-Exchange
This repository contains a functional Python script that exploits CVE-2021-26855, an SSRF vulnerability in Microsoft Exchange Server. The script sends crafted SOAP requests to vulnerable endpoints to extract server information, including domain name, computer name, and domain SID.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (versions affected by CVE-2021-26855)
No auth needed
Prerequisites:
Network access to the target Exchange Server · Target server must be vulnerable to CVE-2021-26855
nomisec
WRITEUP
5 stars
by SCS-Labs · poc
https://github.com/SCS-Labs/HAFNIUM-Microsoft-Exchange-0day
This repository provides a comprehensive writeup and timeline of the HAFNIUM Microsoft Exchange vulnerabilities (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065), including technical details, detection methods, and mitigation strategies. It does not contain exploit code but offers in-depth analysis and references to official advisories.
Classification
Writeup 95%
Attack Type
Ssrf | Deserialization | Auth Bypass | Other
Target:
Microsoft Exchange Server
No auth needed
Prerequisites:
Access to vulnerable Exchange Server · Knowledge of SSRF and deserialization techniques
nomisec
SCANNER
5 stars
by sgnls · poc
https://github.com/sgnls/exchange-0days-202103
This repository contains a PowerShell script designed to detect indicators of compromise (IoCs) for multiple Exchange Server vulnerabilities, including CVE-2021-26855. It scans logs, registry entries, and file systems for artifacts associated with exploitation attempts but does not include functional exploit code.
Classification
Scanner 95%
Target:
Microsoft Exchange Server (multiple versions)
Auth required
Prerequisites:
Local or domain access to the Exchange Server · Sufficient permissions to read logs and registry entries
nomisec
WORKING POC
5 stars
by hackerxj007 · poc
https://github.com/hackerxj007/CVE-2021-26855
This repository contains a functional Go-based exploit for CVE-2021-26855, an SSRF vulnerability in Microsoft Exchange Server. The code includes NTLM authentication handling, vulnerability verification, and user enumeration capabilities.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to vulnerable Exchange server · Valid target URL
nomisec
WORKING POC
4 stars
by ZephrFish · remote
https://github.com/ZephrFish/Exch-CVE-2021-26855_Priv
This repository contains a functional exploit for CVE-2021-26855, leveraging SSRF to achieve RCE on Microsoft Exchange Server. The script automates the exploitation chain, including SSRF, privilege escalation, and webshell deployment.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (ProxyLogon vulnerability)
No auth needed
Prerequisites:
Network access to vulnerable Exchange Server · Valid email address on the target domain
nomisec
WORKING POC
4 stars
by mekhalleh · poc
https://github.com/mekhalleh/exchange_proxylogon
This repository contains a functional Metasploit auxiliary module for scanning and exploiting CVE-2021-26855, a pre-authentication SSRF vulnerability in Microsoft Exchange Server. The module can detect vulnerable instances and is part of an exploit chain leading to RCE.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to the target Exchange Server
nomisec
WORKING POC
4 stars
by TaroballzChen · remote
https://github.com/TaroballzChen/ProxyLogon-CVE-2021-26855-metasploit
This repository contains a functional Metasploit exploit module for CVE-2021-26855, which leverages an SSRF vulnerability in Microsoft Exchange Server to achieve arbitrary file write. The exploit includes detailed steps for setup and execution, targeting the ProxyLogon vulnerability chain.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2019
Auth required
Prerequisites:
Valid Exchange user credentials · Network access to the target Exchange server
nomisec
SCANNER
4 stars
by KotSec · infoleak
https://github.com/KotSec/CVE-2021-26855-Scanner
This repository contains a scanner for CVE-2021-26855, which is a server-side request forgery (SSRF) vulnerability in Microsoft Exchange. The code includes functions to detect the vulnerability by sending crafted HTTP requests and analyzing responses, but it does not include exploit code for achieving remote code execution.
Classification
Scanner 90%
Target:
Microsoft Exchange Server 2013, 2016, 2019
No auth needed
Prerequisites:
Network access to the target Exchange server
nomisec
WORKING POC
4 stars
by Yt1g3r · infoleak
https://github.com/Yt1g3r/CVE-2021-26855_SSRF
This repository contains a functional Python script that exploits CVE-2021-26855, an SSRF vulnerability in Microsoft Exchange Server. The script verifies the vulnerability, performs SSRF attacks, and extracts server information such as domain name, computer name, and domain SID.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to the target Exchange Server · Python environment with 'requests' library
nomisec
WORKING POC
3 stars
by ssrsec · remote
https://github.com/ssrsec/Microsoft-Exchange-RCE
This repository contains a functional exploit for CVE-2021-26855 (SSRF) and CVE-2021-27065 (RCE) in Microsoft Exchange Server. The exploit chains these vulnerabilities to achieve remote code execution by leveraging NTLM authentication, SSRF, and arbitrary file write capabilities.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to the Exchange Server · Exchange Server with vulnerable versions
nomisec
WORKING POC
3 stars
by Immersive-Labs-Sec · poc
https://github.com/Immersive-Labs-Sec/ProxyLogon
This repository contains a functional exploit for CVE-2021-26855, part of the ProxyLogon exploit chain targeting Microsoft Exchange Server. The PoC demonstrates the SSRF vulnerability to bypass authentication and gain administrative access.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to the target Exchange Server · Valid email address of a user on the target system
gitlab
WORKING POC
1 stars
by lucifer113 · poc
https://gitlab.com/lucifer113/ohwaa
This repository contains a functional Python script that exploits CVE-2021-26855 (ProxyLogon) to access and download emails from vulnerable Microsoft Exchange servers. It leverages EWS (Exchange Web Services) SOAP requests to enumerate mailboxes and retrieve emails without authentication.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Vulnerable Exchange server with exposed EWS endpoint · List of target mailboxes
nomisec
WORKING POC
1 stars
by glen-pearson · remote
https://github.com/glen-pearson/ProxyLogon-CVE-2021-26855
This repository contains a functional exploit for CVE-2021-26855 (ProxyLogon), targeting Microsoft Exchange Server. The exploit includes steps for autodiscover, ProxyLogon bypass, and reverse shell creation with obfuscation and persistence mechanisms.
Classification
Working Poc 90%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to the target Exchange Server · Valid email address for autodiscover
gitlab
WORKING POC
by gavz · poc
https://gitlab.com/gavz/ohwaa
This repository contains a functional Python script that exploits CVE-2021-26855 (ProxyLogon) to access and download emails from vulnerable Microsoft Exchange servers. It leverages EWS (Exchange Web Services) SOAP requests to enumerate mailboxes and retrieve emails without authentication.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to vulnerable Exchange server · List of target mailboxes
gitlab
WORKING POC
by swarupsro · poc
https://gitlab.com/swarupsro/ohwaa
This repository contains a functional Python script that exploits CVE-2021-26855 (ProxyLogon) to access and download emails from vulnerable Microsoft Exchange servers. It leverages EWS (Exchange Web Services) SOAP requests to enumerate mailboxes and retrieve emails without authentication.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
vulnerable Exchange server · network access to the target
gitlab
WORKING POC
by rajivraj · poc
https://gitlab.com/rajivraj/ohwaa
This repository contains a functional Python script that exploits CVE-2021-26855 (ProxyLogon) to access and download emails from vulnerable Microsoft Exchange servers. The script uses crafted SOAP requests to interact with Exchange Web Services (EWS) and bypass authentication.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Vulnerable Exchange server · Network access to the target
gitlab
WORKING POC
by d3viluke · poc
https://gitlab.com/d3viluke/ohwaa
This repository contains a functional Python script that exploits CVE-2021-26855 (ProxyLogon) to access and download emails from vulnerable Microsoft Exchange servers. It leverages EWS (Exchange Web Services) SOAP requests to enumerate mailboxes and retrieve emails without authentication.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to vulnerable Exchange server · List of target mailboxes
nomisec
WORKING POC
by SimoesCTT · poc
https://github.com/SimoesCTT/CTT-Exchange-RCE-v1.0---Microsoft-Exchange-Exploit-CVSS-10.0-CRITICAL-CVE-2021-26855-CVE-2021-27065
This repository contains a functional exploit for CVE-2021-26855 and CVE-2021-27065, targeting Microsoft Exchange Server. The exploit chains SSRF (CVE-2021-26855) to achieve remote code execution (CVE-2021-27065) by leaking Legacy DN, SID, and OAB virtual directory info, then uploading a webshell.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server
No auth needed
Prerequisites:
Network access to vulnerable Exchange Server · Exchange Server with unpatched CVE-2021-26855 and CVE-2021-27065
nomisec
WRITEUP
by SimoesCTT · poc
https://github.com/SimoesCTT/CTT-ProxyLogon-RCE-v1.0---Convergent-Time-Theory-Enhanced-Microsoft-Exchange-Exploit
This repository contains a theoretical analysis of CVE-2021-26855 (ProxyLogon) with conceptual enhancements using a 'Convergent Time Theory' framework. It does not include functional exploit code but provides a detailed educational demonstration of how theoretical timing and obfuscation techniques could be applied to the known vulnerability.
Classification
Writeup 95%
Target:
Microsoft Exchange Server
No auth needed
Prerequisites:
Access to a vulnerable Microsoft Exchange Server instance
nomisec
WORKING POC
by Wercd · remote
https://github.com/Wercd/CVE-2021-26855
This is a functional exploit for CVE-2021-26855, a server-side request forgery (SSRF) vulnerability in Microsoft Exchange Server. The script automates the exploitation process, including user enumeration, legacy DN retrieval, and arbitrary file write to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013, 2016, 2019
No auth needed
Prerequisites:
Network access to the Exchange Server · Valid email suffix for the target organization
github
WORKING POC
by iitsmel · htmlpoc
https://github.com/iitsmel/Research/tree/main/CVE-2021-26855
This repository contains a Burp Suite extension that checks for and exploits CVE-2021-26855, an SSRF vulnerability in Microsoft Exchange Server. The extension allows users to verify if a target is vulnerable and perform the attack by sending crafted requests.
Classification
Working Poc 90%
Target:
Microsoft Exchange Server (versions affected by CVE-2021-26855)
No auth needed
Prerequisites:
Burp Suite · network access to the target Exchange Server
nomisec
WORKING POC
by ShyTangerine · poc
https://github.com/ShyTangerine/cve-2021-26855
This repository contains functional exploit code for CVE-2021-26855, a server-side request forgery (SSRF) vulnerability in Microsoft Exchange Server. The PoC demonstrates the exploitation steps, including obtaining DN values, session tokens, and modifying OAB settings to achieve remote code execution via a crafted script.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013, 2016, 2019
No auth needed
Prerequisites:
Access to the Exchange Server's ECP endpoint · Network connectivity to the target server
nomisec
WORKING POC
by TheDudeD6 · remote
https://github.com/TheDudeD6/ExchangeSmash
This repository contains a functional exploit for CVE-2021-26855, part of the ProxyLogon vulnerability chain affecting Microsoft Exchange Server. The exploit leverages SSRF and authentication bypass to achieve remote code execution (RCE) by dropping a web shell on the target system.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to the Exchange Server · Impacket library installed
nomisec
SUSPICIOUS
by 1342486672 · poc
https://github.com/1342486672/Flangvik
The repository contains a minimal README with no technical details or exploit code, only mentioning a C# PoC for CVE-2021-26855 (ProxyLogon) without providing any actual implementation or analysis.
Classification
Suspicious 80%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to vulnerable Exchange Server
nomisec
SUSPICIOUS
by yaoxiaoangry3 · poc
https://github.com/yaoxiaoangry3/Flangvik
The repository contains a minimal README with no actual exploit code or technical details, only a vague description of a C# PoC for CVE-2021-26855 (ProxyLogon). It lacks depth and appears to be a placeholder or lure.
Classification
Suspicious 80%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to vulnerable Exchange Server
nomisec
WRITEUP
by Nick-Yin12 · poc
https://github.com/Nick-Yin12/106362522
This repository contains a detailed writeup in Chinese about the ProxyLogon vulnerability (CVE-2021-26855), discussing its impact as a pre-authentication RCE flaw in Microsoft Exchange Server. It highlights the discovery timeline, responsible disclosure by DEVCORE, and the severity of the vulnerability.
Classification
Writeup 90%
Target:
Microsoft Exchange Server
No auth needed
Prerequisites:
Access to a vulnerable Microsoft Exchange Server instance
nomisec
WORKING POC
by haotiku · poc
https://github.com/haotiku/CVE-2021-26855-exploit-Exchange
This repository contains functional exploit code for CVE-2021-26855, a ProxyLogon vulnerability in Microsoft Exchange Server. The Go and Python scripts demonstrate SSRF and authentication bypass techniques to exploit the vulnerability, including NTLM relaying and user enumeration capabilities.
Classification
Working Poc 95%
Attack Type
Ssrf, Auth Bypass
Target:
Microsoft Exchange Server 2013, 2016, 2019
No auth needed
Prerequisites:
Network access to vulnerable Exchange Server · Valid target URL
nomisec
STUB
by hictf · poc
https://github.com/hictf/CVE-2021-26855-CVE-2021-27065
The repository contains minimal placeholder code (a basic PHP script and a Node.js server) with no functional exploit for CVE-2021-26855. The README lacks technical details or exploit logic.
Target:
Microsoft Exchange Server
No auth needed
nomisec
SCANNER
by antichown · poc
https://github.com/antichown/Scan-Vuln-CVE-2021-26855
This repository contains a Java-based scanner that checks for CVE-2021-26855 (Exchange Server SSRF vulnerability) by using Nmap with a custom script. It reads a list of IP addresses, scans each IP in the subnet, and logs vulnerable IPs to a file.
Classification
Scanner 90%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Nmap installed with the http-vuln-cve2021-26855 script · List of target IP addresses or subnets
nomisec
WORKING POC
by catmandx · remote
https://github.com/catmandx/CVE-2021-26855-Exchange-RCE
This repository contains a functional exploit for CVE-2021-26855, part of the Microsoft Exchange ProxyLogon vulnerability chain. The Python script automates the exploitation process, including SSRF, authentication bypass, and arbitrary file write to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013, 2016, 2019
No auth needed
Prerequisites:
Network access to vulnerable Exchange server · Valid email address on the target server
nomisec
SCANNER
by DCScoder · poc
https://github.com/DCScoder/Exchange_IOC_Hunter
This PowerShell script scans IIS logs for indicators of compromise (IOCs) related to CVE-2021-26855 and other Exchange vulnerabilities. It searches for specific patterns, file paths, and IP addresses associated with exploitation attempts but does not contain functional exploit code.
Classification
Scanner 95%
Target:
Microsoft Exchange Server (multiple versions)
No auth needed
Prerequisites:
Access to IIS logs
nomisec
SCANNER
by mauricelambert · infoleak
https://github.com/mauricelambert/ExchangeWeaknessTest
This script tests for the presence of CVE-2021-26855 (ProxyLogon) by sending a crafted HTTP request to an Exchange Server and checking the response for vulnerability indicators. It does not exploit the vulnerability but detects potential exposure.
Classification
Scanner 95%
Target:
Microsoft Exchange Server (versions affected by CVE-2021-26855)
No auth needed
Prerequisites:
Network access to the target Exchange Server
metasploit
SCANNER
by Orange Tsai, mekhalleh (RAMELLA Sébastien) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/exchange_proxylogon.rb
This Metasploit module scans for CVE-2021-26855 (ProxyLogon), an authentication bypass vulnerability in Microsoft Exchange Server. It checks for SSRF via crafted HTTP requests and validates vulnerability by inspecting the 'X-CalculatedBETarget' header.
Classification
Scanner 100%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to Exchange Server · SSL/TLS enabled on port 443
exploitdb
WORKING POC
pythonwebappswindows
https://www.exploit-db.com/exploits/49637
This exploit demonstrates the Proxylogon vulnerability chain (CVE-2021-26855 and CVE-2021-27065) in Microsoft Exchange Server, leveraging SSRF to achieve arbitrary file write and RCE via a crafted JScript payload.
Classification
Working Poc 100%
Target:
Microsoft Exchange Server 2013, 2016, 2019
No auth needed
Prerequisites:
Network access to the Exchange Server · Valid email address on the target server
metasploit
WORKING POC
by Orange Tsai, GreyOrder, mekhalleh (RAMELLA Sébastien) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/exchange_proxylogon_collector.rb
This Metasploit module exploits CVE-2021-26855, an authentication bypass vulnerability in Microsoft Exchange Server, to dump mailbox data (emails, contacts, attachments) via SSRF. It leverages the ProxyLogon vulnerability to impersonate an admin and interact with the Exchange Web Services (EWS) API.
Classification
Working Poc 100%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Network access to the Exchange server · Exchange server vulnerable to CVE-2021-26855
patchapalooza
WORKING POC
by securitystuffbackup · remote
https://gitlab.com/securitystuffbackup/SharpProxyLogon
SharpProxyLogon is a C# exploit for CVE-2021-26855, a ProxyLogon vulnerability in Microsoft Exchange Server. It chains multiple exploits to achieve remote code execution (RCE) and includes functionality for shellcode injection and semi-interactive shell access.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (ProxyLogon vulnerability)
No auth needed
Prerequisites:
target IP · target email · optional shellcode path · optional injection target path
patchapalooza
WORKING POC
by gvillegas · infoleak
https://gitlab.com/gvillegas/ohwaa
This repository contains a functional Python script that exploits CVE-2021-26855 (ProxyLogon) to access and download emails from vulnerable Microsoft Exchange servers. The script uses crafted SOAP requests to interact with Exchange Web Services (EWS) and bypass authentication.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server (2013, 2016, 2019)
No auth needed
Prerequisites:
Access to the Exchange server's OWA/EWS endpoints · List of target mailboxes
patchapalooza
WORKING POC
by r0xdeadbeef · remote
https://github.com/r0xdeadbeef/CVE-2021-26855
This repository contains a functional exploit for CVE-2021-26855, part of the ProxyLogon vulnerability chain in Microsoft Exchange Server. The PoC automates the exploitation process, including authentication bypass, arbitrary file write, and remote code execution via a crafted HTTP request chain.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013, 2016, 2019 (pre-patch)
No auth needed
Prerequisites:
Network access to Exchange Server · Valid email address on the target server
patchapalooza
WORKING POC
by Udyz · remote
https://github.com/Udyz/Proxylogon
This repository contains a functional exploit for CVE-2021-26855, a pre-authentication SSRF vulnerability in Microsoft Exchange Server leading to arbitrary file write and RCE. The exploit chain involves abusing the Autodiscover endpoint, MAPI over HTTP, and OAB manipulation to drop a webshell.
Classification
Working Poc 95%
Target:
Microsoft Exchange Server 2013/2016/2019
No auth needed
Prerequisites:
network access to Exchange Server · valid email address on the target server