Files
nuclei-templates/http/misconfiguration/ms-exchange-user-enum.yaml

44 lines
1.4 KiB
YAML
Raw Normal View History

id: ms-exchange-user-enum
2023-11-10 12:15:56 +01:00
info:
name: Microsoft Exchange Autodiscover - User Enumeration
author: righettod
severity: info
2023-11-12 16:24:07 +05:30
description: |
Microsoft Exchange (on premise) is prone to a user enumeration via the ActiveSync protocol using the AutodiscoverV2 endpoint.
2023-11-10 12:15:56 +01:00
reference:
- https://www.msxfaq.de/exchange/autodiscover/autodiscover_v2.htm
2023-11-12 16:24:07 +05:30
- https://github.com/righettod/toolbox-pentest-web/blob/master/docs/4-HINTS_ARCHIVED.md#user-enumeration-techniques-for-microsoft-exchange
2024-09-10 14:38:16 +05:30
classification:
cpe: cpe:2.3:a:microsoft:exchange_server:*:*:*:*:*:*:*:*
2023-11-10 12:15:56 +01:00
metadata:
2023-11-12 16:24:07 +05:30
verified: true
max-request: 1
2024-09-10 13:52:50 +05:30
vendor: microsoft
2024-09-10 14:38:16 +05:30
product: exchange_server
shodan-query: http.title:outlook exchange
tags: ms-exchange,microsoft,misconfig,enum,vuln
2023-11-10 12:15:56 +01:00
http:
- method: GET
path:
2023-11-12 16:24:07 +05:30
- "{{BaseURL}}/autodiscover/autodiscover.json?Protocol=ActiveSync&Email={{rand_text_alpha(6)}}%40oast.pro&RedirectCount=1"
2023-11-10 12:15:56 +01:00
matchers-condition: and
matchers:
- type: word
part: header
words:
- "/autodiscover/autodiscover.json?Email="
- type: status
status:
- 302
extractors:
- type: regex
part: header
group: 1
regex:
- '(?i)Email=([A-Za-z0-9@%.-_]+)'
2024-12-01 13:57:55 +00:00
# digest: 4a0a00473045022100e02c24a5cad2b0bbe6e1fea6d5d108a0d6d15fbfa775fd41f01a26696c0524e502204ef46810c9ff1eb8aea8e608bcbaf58ce306a2c5c8dc85a7f337927aceb26573:922c64590222798bb761d5b6d8e72950