Home / os / winmobile

Exchange Control Panel Viewstate Deserialization

Posted on 04 March 2020

This Metasploit module exploits a .NET serialization vulnerability in the Exchange Control Panel (ECP) web page. The vulnerability is due to Microsoft Exchange Server not randomizing the keys on a per-installation basis resulting in them using the same validationKey and decryptionKey values. With knowledge of these, values an attacker can craft a special viewstate to cause an OS command to be executed by NT_AUTHORITYSYSTEM using .NET deserialization.

 

TOP