Files
nuclei-templates/technologies/microsoft/ms-exchange-server.yaml
Pierre 7910908dff Clean MS Exchange detection (#4243)
* Clean MS Exchange detect

  - Extract version from body when the header is missing

  - Makes it clear that we are looking either for a header or for
    specific body content

  - Accept older (and newer) versions

* misc updates

Co-authored-by: Pierre Lalet <pierre@drids-corp.org>
Co-authored-by: sandeep <sandeep@projectdiscovery.io>
2022-05-05 23:43:11 +05:30

44 lines
1021 B
YAML

id: ms-exchange-server
info:
name: Microsoft Exchange Server Detect
author: pikpikcu,dhiyaneshDK
severity: info
description: Check for Exchange Server CVEs CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065, using Outlook Web App path data.
reference:
- https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange.nse
tags: microsoft,exchange,tech
requests:
- method: GET
path:
- "{{BaseURL}}/owa/auth/logon.aspx"
matchers-condition: or
matchers:
- type: regex
part: header
regex:
- "(?i)(X-Owa-Version:)"
- type: regex
part: body
regex:
- "/owa/auth/[0-9.]+/"
- type: word
words:
- '<title>Exchange Log In</title>'
- '<title>Microsoft Exchange - Outlook Web Access</title>'
extractors:
- type: kval
kval:
- x_owa_version
- type: regex
part: body
group: 1
regex:
- "/owa/auth/([0-9.]+)/"